{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:41:16Z","timestamp":1774161676911,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/malware.2013.6703693","type":"proceedings-article","created":{"date-parts":[[2014,1,10]],"date-time":"2014-01-10T20:05:37Z","timestamp":1389384337000},"page":"116-123","source":"Crossref","is-referenced-by-count":69,"title":["Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus"],"prefix":"10.1109","author":[{"given":"Dennis","family":"Andriesse","sequence":"first","affiliation":[{"name":"VU University Amsterdam, The Netherlands"}]},{"given":"Christian","family":"Rossow","sequence":"additional","affiliation":[{"name":"VU University Amsterdam, The Netherlands"}]},{"given":"Brett","family":"Stone-Gross","sequence":"additional","affiliation":[{"name":"Dell SecureWorks"}]},{"given":"Daniel","family":"Plohmann","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Bonn, Germany"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"VU University Amsterdam, The Netherlands"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_10"},{"key":"17","year":"2011","journal-title":"Zeus Gets More Sophisticated Using p2p Techniques"},{"key":"18","author":"wyke","year":"2011","journal-title":"What Is Zeus?"},{"key":"15","author":"stone-gross","year":"2012","journal-title":"The Lifecycle of Peer-to-Peer Zeus"},{"key":"16","author":"tarakanov","year":"2011","journal-title":"Ice IX Not Cool at All"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978682"},{"key":"14","author":"sherstobitoff","year":"2013","journal-title":"Inside TheWorld of the Citadel Trojan"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.17"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-39235-1_2","article-title":"Provex: Detecting botnets with encrypted command and control channels","author":"rossow","year":"2013","journal-title":"Proc Conf Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)"},{"key":"3","year":"2013","journal-title":"Zeus P2P Monitoring and Analysis"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-28641-4_14","article-title":"Revisiting botnet models and their implications for takedown strategies","author":"yen","year":"2012","journal-title":"Proceedings of the 1st Conference on Principles of Security and Trust (POST'12)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593240"},{"key":"1","article-title":"From throw-away traffic to bots: Detecting the rise of dga-based malware","author":"antonakakis","year":"2012","journal-title":"Proceedings of the 21st USENIX Security Symposium (USENIX Sec'12)"},{"key":"10","article-title":"Kademlia: A peer-to-peer information system based on the xor metric","author":"maymounkov","year":"2002","journal-title":"Revised Papers from the First Int'l Workshop Peer-to-Peer Systems (IPTPS '02)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/EC2ND.2008.11"},{"key":"6","author":"falliere","year":"2009","journal-title":"Zeus King of the Bots"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690856"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.44"},{"key":"9","author":"lelli","year":"2012","journal-title":"Zeusbot\/Spyeye P2P Updated Fortifying the Botnet"},{"key":"8","author":"itabashi","year":"2010","journal-title":"How Trojan Zbot B!inf Uses Crypto API"}],"event":{"name":"2013 8th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","location":"Fajardo, PR, USA","start":{"date-parts":[[2013,10,22]]},"end":{"date-parts":[[2013,10,24]]}},"container-title":["2013 8th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6693154\/6703677\/06703693.pdf?arnumber=6703693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T00:05:13Z","timestamp":1623110713000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6703693\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/malware.2013.6703693","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}