{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:03Z","timestamp":1763467983444,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,8,30]],"date-time":"2010-08-30T00:00:00Z","timestamp":1283126400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,8,30]]},"DOI":"10.1145\/1851276.1851287","type":"proceedings-article","created":{"date-parts":[[2010,8,31]],"date-time":"2010-08-31T13:06:04Z","timestamp":1283259964000},"page":"43-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Suppressing bot traffic with accurate human attestation"],"prefix":"10.1145","author":[{"given":"Muhammad Asim","family":"Jamshed","sequence":"first","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"Wonho","family":"Kim","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"KyoungSoo","family":"Park","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2010,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Dropbear SSH server and client. http:\/\/matt.ucc.asn.au\/dropbear\/dropbear.html.  Dropbear SSH server and client. http:\/\/matt.ucc.asn.au\/dropbear\/dropbear.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Google Postini Services. http:\/\/www.google.com\/postini.  Google Postini Services. http:\/\/www.google.com\/postini."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of USENIX NSDI","author":"Gummadi R.","year":"2009","unstructured":"R. Gummadi , H. Balakrishnan , P. Maniatis , and S. Ratnasamy . Not-a-Bot (NAB): Improving service availability in the face of botnet attacks . In Proceedings of USENIX NSDI , 2009 . R. Gummadi, H. Balakrishnan, P. Maniatis, and S. Ratnasamy. Not-a-Bot (NAB): Improving service availability in the face of botnet attacks. In Proceedings of USENIX NSDI, 2009."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Hao S.","year":"2009","unstructured":"S. Hao , N. A. Syed , N. Feamster , A. G. Gray , and S. Krasser . Detecting spammers with SNARE: Spatio-temporal network-level automatic reputation engine . In Proceedings of the USENIX Security Symposium , 2009 . S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser. Detecting spammers with SNARE: Spatio-temporal network-level automatic reputation engine. In Proceedings of the USENIX Security Symposium, 2009."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of USENIX NSDI","author":"John J. P.","year":"2009","unstructured":"J. P. John , A. Moshchuk , S. D. Gribble , and A. Krishnamurthy . Studying spamming botnets using botlab . In Proceedings of USENIX NSDI , 2009 . J. P. John, A. Moshchuk, S. D. Gribble, and A. Krishnamurthy. Studying spamming botnets using botlab. In Proceedings of USENIX NSDI, 2009."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_7_1","unstructured":"MessageLabs Intelligence: 2009 Annual Security Report. http:\/\/www.messagelabs.com\/mlireport\/ 2009MLIAnnualReport_Final_PrintResolution.pdf.  MessageLabs Intelligence: 2009 Annual Security Report. http:\/\/www.messagelabs.com\/mlireport\/ 2009MLIAnnualReport_Final_PrintResolution.pdf."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the USENIX Annual Technical Conference","author":"Park K.","year":"2007","unstructured":"K. Park , V. S. Pai , K.-W. Lee , and S. Calo . Securing web service by automatic robot detection . In Proceedings of the USENIX Annual Technical Conference , 2007 . K. Park, V. S. Pai, K.-W. Lee, and S. Calo. Securing web service by automatic robot detection. In Proceedings of the USENIX Annual Technical Conference, 2007."},{"key":"e_1_3_2_1_9_1","unstructured":"Postfix Mail Transfer Agent. http:\/\/www.postfix.org\/.  Postfix Mail Transfer Agent. http:\/\/www.postfix.org\/."},{"volume-title":"IT staff member for the Univerity of Pittsburgh","year":"2009","key":"e_1_3_2_1_10_1","unstructured":"Private conversation with Ben Carter , IT staff member for the Univerity of Pittsburgh , 2009 . Private conversation with Ben Carter, IT staff member for the Univerity of Pittsburgh, 2009."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315288"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Sailer R.","year":"2004","unstructured":"R. Sailer , X. Zhang , T. Jaeger , and L. v. Doom . Design and implementation of a TCG-based integrity measurement architecture . In Proceedings of the USENIX Security Symposium , 2004 . R. Sailer, X. Zhang, T. Jaeger, and L. v. Doom. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the USENIX Security Symposium, 2004."},{"key":"e_1_3_2_1_14_1","unstructured":"Spam and Open Relay Blocking System (SORBS). http:\/\/www.au.sorbs.net\/.  Spam and Open Relay Blocking System (SORBS). http:\/\/www.au.sorbs.net\/."},{"key":"e_1_3_2_1_15_1","unstructured":"The Apache SpamAssassin Project. http:\/\/spamassassin.apache.org\/.  The Apache SpamAssassin Project. http:\/\/spamassassin.apache.org\/."},{"key":"e_1_3_2_1_16_1","unstructured":"URL Blacklist. http:\/\/urlblacklist.com\/.  URL Blacklist. http:\/\/urlblacklist.com\/."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Venkataraman S.","year":"2007","unstructured":"S. Venkataraman , S. Sen , O. Spatscheck , P. Haffner , and D. Song . Exploiting network structure for proactive spam mitigation . In Proceedings of the USENIX Security Symposium , 2007 . S. Venkataraman, S. Sen, O. Spatscheck, P. Haffner, and D. Song. Exploiting network structure for proactive spam mitigation. In Proceedings of the USENIX Security Symposium, 2007."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247415.1247429"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402979"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of USENIX NSDI","author":"Zhao Y.","year":"2009","unstructured":"Y. Zhao , Y. Xie , F. Yu , Q. Ke , Y. Yu , Y. Chen , and E. Gillum . BotGraph: Large scale spamming botnet detection . In Proceedings of USENIX NSDI , 2009 . Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum. BotGraph: Large scale spamming botnet detection. In Proceedings of USENIX NSDI, 2009."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) Botnets, Spyware, Worms, and More","author":"Zhuang L.","year":"2008","unstructured":"L. Zhuang , J. Dunagan , D. R. Simon , H. J. Wang , and J. D. Tygar . Characterizing botnets from email spam records . In Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) Botnets, Spyware, Worms, and More , 2008 . L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, and J. D. Tygar. Characterizing botnets from email spam records. In Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) Botnets, Spyware, Worms, and More, 2008."}],"event":{"name":"SIGCOMM '10: ACM SIGCOMM 2010 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"New Delhi India","acronym":"SIGCOMM '10"},"container-title":["Proceedings of the first ACM asia-pacific workshop on Workshop on systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1851276.1851287","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1851276.1851287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:44Z","timestamp":1750248524000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1851276.1851287"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,30]]},"references-count":21,"alternative-id":["10.1145\/1851276.1851287","10.1145\/1851276"],"URL":"https:\/\/doi.org\/10.1145\/1851276.1851287","relation":{},"subject":[],"published":{"date-parts":[[2010,8,30]]},"assertion":[{"value":"2010-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}