{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:16:25Z","timestamp":1758845785117},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/malware.2008.4690854","type":"proceedings-article","created":{"date-parts":[[2008,12,9]],"date-time":"2008-12-09T18:03:19Z","timestamp":1228845799000},"source":"Crossref","is-referenced-by-count":90,"title":["As the net churns: Fast-flux botnet observations"],"prefix":"10.1109","author":[{"given":"Jose","family":"Nazario","sequence":"first","affiliation":[]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"passive dns replication","author":"weimer","year":"2005","journal-title":"Proceedings of 17th Annual FIRST Conference on Computer Security Incident Handling"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73614-1_8"},{"key":"15","year":"2008"},{"key":"16","year":"2007","journal-title":"Know Your Enemy Fast-Flux Service Networks"},{"key":"13","author":"porras","year":"2007","journal-title":"A multi-perspective analysis of the storm (peacomm) worm"},{"key":"14","year":"2008","journal-title":"PhishTank"},{"key":"11","article-title":"an empirical analysis of the current state of phishing attack and defence","author":"moore","year":"2007","journal-title":"Proceedings of the 2007 Workshop on the Economics of Information Security (WEIS'07)"},{"key":"12","year":"0"},{"key":"3","year":"2008"},{"key":"2","article-title":"dns-bh - malware domain blocklist","year":"2008"},{"key":"1","year":"2008","journal-title":"CastleCops"},{"key":"10","year":"2008","journal-title":"Malware Domain List"},{"key":"7","year":"2008","journal-title":"Jeremy Storm Worm Fast Fast Flux domain \"superdrugtesting com\""},{"key":"6","year":"2008","journal-title":"SAC 025 Ssa Advisory on Fast Flux Hosting and DNS"},{"key":"5","article-title":"measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm","author":"holz","year":"2008","journal-title":"Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '08)"},{"key":"4","article-title":"measuring and detecting fast-flux service networks","author":"holz","year":"2008","journal-title":"Proc 10th Ann Network and Distributed System Security Symp (NDSS)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505224"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(00)00315-7"}],"event":{"name":"2008 3rd International Conference on Malicious and Unwanted Software (MALWARE)","location":"Fairfax, VI","start":{"date-parts":[[2008,10,7]]},"end":{"date-parts":[[2008,10,8]]}},"container-title":["2008 3rd International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4686744\/4690850\/04690854.pdf?arnumber=4690854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T20:45:54Z","timestamp":1580935554000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4690854\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/malware.2008.4690854","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}