{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:25:32Z","timestamp":1725704732204},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/malware.2014.6999406","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:44:39Z","timestamp":1421703879000},"page":"76-84","source":"Crossref","is-referenced-by-count":4,"title":["BoTGen: A new approach for in-lab generation of botnet datasets"],"prefix":"10.1109","author":[{"given":"Muhammad H.","family":"ElSheikh","sequence":"first","affiliation":[]},{"given":"Mohammed S.","family":"Gadelrab","sequence":"additional","affiliation":[]},{"given":"Mahmoud A.","family":"Ghoneim","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Rashwan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593240"},{"journal-title":"Irssi-The Client of the Future","year":"0","key":"17"},{"journal-title":"Github com\/msparks\/irssiscripts","article-title":"Socket-interface","year":"0","key":"18"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1012888.1005733"},{"journal-title":"Ns-2","year":"0","key":"15"},{"journal-title":"MIRC","year":"0","key":"16"},{"key":"13","article-title":"Isolated Virtualised Clusters: Testbeds for High-Risk Security Experimentation and Training","author":"calvet","year":"2010","journal-title":"CSET"},{"key":"14","first-page":"323","article-title":"OMNeT: Objective Modular Network Testbed","author":"pongor","year":"1993","journal-title":"proceedings of the International Workshop on Modeling Analysis and Simulation of Computer and Telecommunications Systems"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920284"},{"journal-title":"A General-purpose Laboratory for Large-scale Botnet Experiments","year":"2013","author":"barabosch","key":"12"},{"journal-title":"GNS3","year":"0","key":"21"},{"journal-title":"Curl and Libcurl","year":"0","key":"20"},{"journal-title":"Tiny Core Linux","year":"0","key":"22"},{"journal-title":"Open Vswitch","year":"0","key":"23"},{"year":"0","key":"24"},{"journal-title":"Busybox","year":"0","key":"25"},{"journal-title":"Beware Ircd","year":"0","key":"26"},{"journal-title":"The Apache HTTP Server","year":"0","key":"27"},{"journal-title":"PHP Hypertext preprocessor","year":"0","key":"28"},{"journal-title":"MySql","year":"0","key":"29"},{"key":"3","article-title":"BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic","author":"gu","year":"2008","journal-title":"Proc 14th Annu Netw Distrib Syst Secur Symp"},{"key":"2","first-page":"139","article-title":"BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection","author":"gu","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"10","article-title":"Toward botnet mesocosms","author":"barford","year":"2007","journal-title":"1st Workshop on Hot Topics in Understanding Botnets USA"},{"journal-title":"The Honeynet Project","year":"0","key":"1"},{"journal-title":"Dnsmasq Network Services for Small Networks","year":"0","author":"kelley","key":"30"},{"key":"7","first-page":"6","article-title":"Challenges in Experimenting with Botnet Detection Systems","author":"aviv","year":"2011","journal-title":"4th Conf on Cyber Security Experimentation and Test USA"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958212"},{"journal-title":"NGR Rootkit","year":"0","author":"rong hwa","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.76"},{"journal-title":"Wireshark","year":"0","key":"31"},{"key":"4","first-page":"207","article-title":"Traffic aggregation for malware detection","author":"yen","year":"2008","journal-title":"DIMVA"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TRIDNT.2006.1649172"},{"journal-title":"Network Emulation Testbed","year":"0","key":"8"}],"event":{"name":"2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)","start":{"date-parts":[[2014,10,28]]},"location":"Fajardo, PR","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6987537\/6999400\/06999406.pdf?arnumber=6999406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T08:30:58Z","timestamp":1580805058000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6999406\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/malware.2014.6999406","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}