{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T15:49:20Z","timestamp":1744904960347,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/wifs.2011.6123125","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T22:03:26Z","timestamp":1326319406000},"page":"1-6","source":"Crossref","is-referenced-by-count":53,"title":["BotCloud: Detecting botnets using MapReduce"],"prefix":"10.1109","author":[{"given":"Jerome","family":"Francois","sequence":"first","affiliation":[]},{"given":"Shaonan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Walter","family":"Bronzi","sequence":"additional","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Honeypots Tracking Hackers","year":"2002","author":"spitzner","key":"19"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402970"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02136-7","author":"lin","year":"2010","journal-title":"Data-Intensive Text Processing with MapReduce (Synthesis Lectures on Human Language Technologies)"},{"key":"36","article-title":"Botgrep: Finding p2p bots with structured graph analysis","author":"nagaraja","year":"0","journal-title":"Proceedings of the 4th International Conference on Autonomous Infrastructure Management and Security (USENIX Security Symposium) 2010"},{"journal-title":"The PageRank Citation Ranking Bringing Order to the Web","year":"1998","author":"page","key":"18"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544023"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1177002"},{"key":"34","article-title":"Blinc: Multilevel traffic classification in the dark","author":"karagiannis","year":"0","journal-title":"ACM Conference on Applications Technologies Architectures and Protocols for Computer Communications (SIGCOMM) 2005"},{"journal-title":"Amazon Elastic Compute Cloud (Amazon EC2)","year":"2008","key":"16"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/1162666.1162669"},{"key":"13","article-title":"MapReduce: Simplified data processing on large clusters","author":"dean","year":"2004","journal-title":"Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1459"},{"key":"37","article-title":"Mining netflow records for critical network activities","author":"wang","year":"0","journal-title":"Proceedings of the 4th International Conference on Autonomous Infrastructure Management and Security (AIMS) 2010"},{"key":"11","article-title":"Cisco Systems NetFlow Services Export Version 9","volume":"3954","author":"claise","year":"2004","journal-title":"RFC"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2010.5691334"},{"key":"12","article-title":"Bottrack: Tracking botnets using netflow and pagerank","author":"franc?ois","year":"0","journal-title":"Proceedings of IFIP\/TC6 Networking 2011"},{"journal-title":"Peakflow SP Traffic Anomaly Detection","year":"0","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1830252.1830263"},{"key":"40","article-title":"Botgraph: Large scale spamming botnet detection","author":"zhao","year":"2009","journal-title":"Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation"},{"key":"22","article-title":"Chord: A scalable Peer-To-Peer lookup service for internet applications","author":"stoica","year":"0","journal-title":"Proceedings of the 2001 ACM SIGCOMM Conference 2001"},{"key":"23","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","article-title":"Kademlia: A peer-to-peer information system based on the xor metric","author":"maymounkov","year":"2002","journal-title":"IPTPS '01 First Intl Workshop on Peer-to-Peer Systems"},{"key":"24","article-title":"Koorde: A simple degree-optimal distributed hash table","author":"kaashoek","year":"0","journal-title":"International Workshop on Peer-To-Peer Systems (IPTPS) 2003"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.032210.00054"},{"key":"26","first-page":"41","article-title":"A multifaceted approach to understanding the botnet phenomenon","author":"abu rajab","year":"0","journal-title":"ACM SIGCOMM Conference on Internet Measurement (IMC) 2006"},{"key":"27","first-page":"1","article-title":"Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm","author":"holz","year":"2008","journal-title":"LEET'08 Proceedings of the 1st Usenix Workshop on Large- Scale Exploits and Emergent Threats"},{"key":"28","article-title":"Wide-scale botnet detection and characterization","author":"karasaridis","year":"2007","journal-title":"First Workshop on Hot Topics in Understanding Botnets (HotBots)"},{"key":"29","article-title":"Cleaning your house first: Shifting the paradigm on how to secure networks","author":"franc?ois","year":"2011","journal-title":"International Conference on Autonomous Infrastructure Management and Security (AIMS)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1410234.1410238"},{"journal-title":"Hadoop The Definitive Guide","year":"2009","author":"white","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067738"},{"journal-title":"The PageRank Citation Ranking Bringing Order to the Web","year":"1998","author":"page","key":"1"},{"key":"30","first-page":"139","article-title":"Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection","author":"gu","year":"0","journal-title":"USENIX Security Symposium (SS) San Jose CA July 2008"},{"journal-title":"\"A Multi-perspective Analysis of the Storm (Peacomm) Worm \" [Online]","year":"0","author":"porras","key":"7"},{"journal-title":"Mariposa Botnet Mastermind Nabbed","year":"2010","author":"masters","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658967"},{"journal-title":"Worldwide Infrastructure Security Report (2009 Report)","year":"2010","key":"5"},{"key":"31","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-74320-0_15","article-title":"Hit-list worm detection and bot identification in large networks using protocol graphs","author":"collins","year":"2007","journal-title":"Recent Advances in Intrusion Detection (RAID)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.07.013"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1368506.1368520"},{"journal-title":"Safeback","year":"0","key":"8"}],"event":{"name":"2011 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2011,11,29]]},"location":"Iguacu Falls, Brazil","end":{"date-parts":[[2011,12,2]]}},"container-title":["2011 IEEE International Workshop on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112284\/6123119\/06123125.pdf?arnumber=6123125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,13]],"date-time":"2023-06-13T13:41:35Z","timestamp":1686663695000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6123125\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/wifs.2011.6123125","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}