{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:51:12Z","timestamp":1771699872250,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,22]],"date-time":"2011-03-22T00:00:00Z","timestamp":1300752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["0831300CNS-0954096"],"award-info":[{"award-number":["0831300CNS-0954096"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["FA8750-08-2-0141"],"award-info":[{"award-number":["FA8750-08-2-0141"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000140710907N000140911042N000140910776"],"award-info":[{"award-number":["N000140710907N000140911042N000140910776"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,22]]},"DOI":"10.1145\/1966913.1966930","type":"proceedings-article","created":{"date-parts":[[2011,4,7]],"date-time":"2011-04-07T09:36:11Z","timestamp":1302168971000},"page":"124-134","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Boosting the scalability of botnet detection using adaptive traffic sampling"],"prefix":"10.1145","author":[{"given":"Junjie","family":"Zhang","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University"}]},{"given":"Roberto","family":"Perdisci","sequence":"additional","affiliation":[{"name":"University of Georgia"}]},{"given":"Guofei","family":"Gu","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2011,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.326"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452551"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/996566.996733"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. USENIX SRUTI","author":"Binkley J. R.","year":"2006","unstructured":"J. R. Binkley and S. Singh . An algorithm for anomaly-based botnet detection . In Proc. USENIX SRUTI , 2006 . J. R. Binkley and S. Singh. An algorithm for anomaly-based botnet detection. In Proc. USENIX SRUTI, 2006."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. NDSS","author":"Gu G.","year":"2008","unstructured":"G. Gu , J. Zhang , and W. Lee . Botsniffer: Detecting botnet command and control channels in network traffic . In Proc. NDSS , 2008 . G. Gu, J. Zhang, and W. Lee. Botsniffer: Detecting botnet command and control channels in network traffic. In Proc. NDSS, 2008."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. USENIX Security","author":"Gu G.","year":"2007","unstructured":"G. Gu , P. Porras , V. Yegneswaran , M. Fong , W. and Lee . Bothunter : Detecting malware infection through IDS-driven dialog correlation . In Proc. USENIX Security , 2007 . G. Gu, P. Porras, V. Yegneswaran, M. Fong, W. and Lee. Bothunter: Detecting malware infection through IDS-driven dialog correlation. In Proc. USENIX Security, 2007."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. USENIX Security","author":"Gu G.","year":"2008","unstructured":"G. Gu , R. Perdisci , J. Zhang , and W. Lee . Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection . In Proc. USENIX Security , 2008 . G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proc. USENIX Security, 2008."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. USENIX HotBots","author":"Goebel J.","year":"2007","unstructured":"J. Goebel and T. Holz . Rishi: identify bot contaminated hosts by irc nickname evaluation . In Proc. USENIX HotBots , 2007 . J. Goebel and T. Holz. Rishi: identify bot contaminated hosts by irc nickname evaluation. In Proc. USENIX HotBots, 2007."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.14"},{"key":"e_1_3_2_1_10_1","unstructured":"Infosecurity. Storm deadnet reanimates as waledac botnet. http:\/\/infosecurity.us\/?p=6262 2009.  Infosecurity. Storm deadnet reanimates as waledac botnet. http:\/\/infosecurity.us\/?p=6262 2009."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533064"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. USENIX HotBots","author":"Karasaridis A.","year":"2007","unstructured":"A. Karasaridis , B. Rexroad , and D. Hoeflin . Wide-scale botnet detection and characterization . In Proc. USENIX HotBots , 2007 . A. Karasaridis, B. Rexroad, and D. Hoeflin. Wide-scale botnet detection and characterization. In Proc. USENIX HotBots, 2007."},{"key":"e_1_3_2_1_13_1","volume-title":"Georgia Institute of Technology","author":"Lee C. P.","year":"2008","unstructured":"C. P. Lee . FRAMEWORK FOR BOTNET EMULATION AND ANALYSIS. PhD thesis , Georgia Institute of Technology , Atlanta, GA , Nov. 2008 . C. P. Lee. FRAMEWORK FOR BOTNET EMULATION AND ANALYSIS. PhD thesis, Georgia Institute of Technology, Atlanta, GA, Nov. 2008."},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. IEEE WoNS","author":"Livadas C.","year":"2006","unstructured":"C. Livadas , R. Walsh , D. Lapsley , and W. T. Strayer . Using machine learning techniques to identify botnet traffic . In Proc. IEEE WoNS , 2006 . C. Livadas, R. Walsh, D. Lapsley, and W. T. Strayer. Using machine learning techniques to identify botnet traffic. In Proc. IEEE WoNS, 2006."},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. USENIX SRUTI","author":"Ramachandran A.","year":"2006","unstructured":"A. Ramachandran , N. Feamster , and D. Dagon . Revealing botnet membership using DNSBL counter-intelligence . In Proc. USENIX SRUTI , 2006 . A. Ramachandran, N. Feamster, and D. Dagon. Revealing botnet membership using DNSBL counter-intelligence. In Proc. USENIX SRUTI, 2006."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.29"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322100"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.76"},{"key":"e_1_3_2_1_19_1","volume-title":"IEEE Global Internet Symposium","author":"Wenjia Fang L. P.","year":"1999","unstructured":"L. P. Wenjia Fang . Inter-as traffic patterns and their implications . In IEEE Global Internet Symposium , 1999 . L. P. Wenjia Fang. Inter-as traffic patterns and their implications. In IEEE Global Internet Symposium, 1999."},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. NDSS","author":"Hu X.","year":"2009","unstructured":"X. Hu , M. Knysz and K. Shin . Rb-seeker: Auto-detection of redirection botnets . In Proc. NDSS , 2009 . X. Hu, M. Knysz and K. Shin. Rb-seeker: Auto-detection of redirection botnets. In Proc. NDSS, 2009."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028802"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. USENIX NSDI","author":"Zhao Y.","year":"2009","unstructured":"Y. Zhao and Y. Xie and F. Yu and Q. Ke and Y. Yu . Botgraph: Large scale spamming botnet detection . In Proc. USENIX NSDI , 2009 . Y. Zhao and Y. Xie and F. Yu and Q. Ke and Y. Yu. Botgraph: Large scale spamming botnet detection. In Proc. USENIX NSDI, 2009."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_11"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/233269.233324"}],"event":{"name":"ASIA CCS '11: 6th ACM Symposium on Information, Compuer and Communications Security","location":"Hong Kong China","acronym":"ASIA CCS '11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1966913.1966930","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1966913.1966930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:25Z","timestamp":1750243945000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1966913.1966930"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,22]]},"references-count":24,"alternative-id":["10.1145\/1966913.1966930","10.1145\/1966913"],"URL":"https:\/\/doi.org\/10.1145\/1966913.1966930","relation":{},"subject":[],"published":{"date-parts":[[2011,3,22]]},"assertion":[{"value":"2011-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}