{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:28Z","timestamp":1750306888879,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,11,14]],"date-time":"2012-11-14T00:00:00Z","timestamp":1352851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,11,14]]},"DOI":"10.1145\/2398776.2398823","type":"proceedings-article","created":{"date-parts":[[2012,11,20]],"date-time":"2012-11-20T15:50:26Z","timestamp":1353426626000},"page":"453-460","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Longtime behavior of harvesting spam bots"],"prefix":"10.1145","author":[{"given":"Oliver","family":"Hohlfeld","sequence":"first","affiliation":[{"name":"TU Berlin \/ Telekom Innovation Laboratories, Berlin, Germany"}]},{"given":"Thomas","family":"Graf","sequence":"additional","affiliation":[{"name":"Modas GmbH, Berlin, Germany"}]},{"given":"Florin","family":"Ciucu","sequence":"additional","affiliation":[{"name":"TU Berlin \/ Telekom Innovation Laboratories, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,11,14]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.113"},{"key":"e_1_3_2_2_2_1","first-page":"9","volume-title":"Workshop on Machine Learning in the New Information Age","author":"Androutsopoulos I.","year":"2000","unstructured":"I. Androutsopoulos , J. Koutsias , K. V. Chandrinos , G. Paliouras , and C. D. Spyropoulos . An evaluation of Naive Bayesian anti-spam filtering . In Workshop on Machine Learning in the New Information Age , pages 9 -- 17 , 2000 . I. Androutsopoulos, J. Koutsias, K. V. Chandrinos, G. Paliouras, and C. D. Spyropoulos. An evaluation of Naive Bayesian anti-spam filtering. In Workshop on Machine Learning in the New Information Age, pages 9--17, 2000."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2009.5207323"},{"key":"e_1_3_2_2_4_1","unstructured":"eMarkSofts. Fast email harvester 1.2. http:\/\/fast-email-harvester.smartcode.com\/info.html 2009.  eMarkSofts. Fast email harvester 1.2. http:\/\/fast-email-harvester.smartcode.com\/info.html 2009."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028837"},{"key":"e_1_3_2_2_6_1","volume-title":"Network and Distributed System Security Symposium","author":"Gu G.","year":"2008","unstructured":"G. Gu , J. Zhang , and W. Lee . BotSniffer: Detecting botnet command and control channels in network traffic . In Network and Distributed System Security Symposium , 2008 . G. Gu, J. Zhang, and W. Lee. BotSniffer: Detecting botnet command and control channels in network traffic. In Network and Distributed System Security Symposium, 2008."},{"key":"e_1_3_2_2_7_1","first-page":"101","volume-title":"USENIX security symposium","author":"Hao S.","year":"2009","unstructured":"S. Hao , N. A. Syed , N. Feamster , A. G. Gray , and S. Krasser . Detecting spammers with snare: spatio-temporal network-level automatic reputation engine . In USENIX security symposium , pages 101 -- 118 , 2009 . S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser. Detecting spammers with snare: spatio-temporal network-level automatic reputation engine. In USENIX security symposium, pages 101--118, 2009."},{"key":"e_1_3_2_2_8_1","volume-title":"IMC 2012 address harvesting data set. http:\/\/www.net.t-labs.tu-berlin.de\/ oliver\/harvesting\/","author":"Hohlfeld O.","year":"2012","unstructured":"O. Hohlfeld . IMC 2012 address harvesting data set. http:\/\/www.net.t-labs.tu-berlin.de\/ oliver\/harvesting\/ , 2012 . O. Hohlfeld. IMC 2012 address harvesting data set. http:\/\/www.net.t-labs.tu-berlin.de\/ oliver\/harvesting\/, 2012."},{"key":"e_1_3_2_2_9_1","volume-title":"Network and Distributed System Security Symposium","author":"Holz T.","year":"2008","unstructured":"T. Holz , C. Gorecki , K. Rieck , and F. C. Freiling . Measuring and detecting fast-flux service networks . In Network and Distributed System Security Symposium , 2008 . T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling. Measuring and detecting fast-flux service networks. In Network and Distributed System Security Symposium, 2008."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935091"},{"key":"e_1_3_2_2_11_1","first-page":"291","volume-title":"USENIX NSDI","author":"John J. P.","year":"2009","unstructured":"J. P. John , A. Moshchuk , S. D. Gribble , and A. Krishnamurthy . Studying spamming botnets using botlab . In USENIX NSDI , pages 291 -- 306 , 2009 . J. P. John, A. Moshchuk, S. D. Gribble, and A. Krishnamurthy. Studying spamming botnets using botlab. In USENIX NSDI, pages 291--306, 2009."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.95"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934985"},{"key":"e_1_3_2_2_15_1","volume-title":"International Conference on Weblogs and Social Media","author":"Kolari P.","year":"2007","unstructured":"P. Kolari , A. Java , and A. Joshi . Spam in Blogs and Social Media, Tutorial . In International Conference on Weblogs and Social Media , 2007 . P. Kolari, A. Java, and A. Joshi. Spam in Blogs and Social Media, Tutorial . In International Conference on Weblogs and Social Media, 2007."},{"key":"e_1_3_2_2_16_1","volume-title":"USENIX LEET","author":"Kreibich C.","year":"2009","unstructured":"C. Kreibich , C. Kanich , K. Levchenko , B. Enright , G. M. Voelker , V. Paxson , and S. Savage . Spamcraft: an inside look at spam campaign orchestration . In USENIX LEET , 2009 . C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamcraft: an inside look at spam campaign orchestration. In USENIX LEET, 2009."},{"key":"e_1_3_2_2_17_1","volume-title":"Network and Distributed System Security Symposium","author":"Niu Y.","year":"2007","unstructured":"Y. Niu , H. Chen , F. Hsu , Y.-M. Wang , and M. Ma . A quantitative study of forum spamming using context-based analysis . In Network and Distributed System Security Symposium , 2007 . Y. Niu, H. Chen, F. Hsu, Y.-M. Wang, and M. Ma. A quantitative study of forum spamming using context-based analysis. In Network and Distributed System Security Symposium, 2007."},{"key":"e_1_3_2_2_18_1","unstructured":"Northworks Solutions Ltd. Ecrawl v2.63. http:\/\/www.northworks.biz\/software.html 2012.  Northworks Solutions Ltd. Ecrawl v2.63. http:\/\/www.northworks.biz\/software.html 2012."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555352"},{"key":"e_1_3_2_2_20_1","volume-title":"Anti-Abuse and Spam Conference","author":"Prince M. B.","year":"2005","unstructured":"M. B. Prince , B. M. Dahl , L. Holloway , A. M. Keller , and E. Langheinrich . Understanding how spammers steal your e-mail address: An analysis of the first six months of data from project honey pot. In Collaboration, Electronic messaging , Anti-Abuse and Spam Conference , 2005 . M. B. Prince, B. M. Dahl, L. Holloway, A. M. Keller, and E. Langheinrich. Understanding how spammers steal your e-mail address: An analysis of the first six months of data from project honey pot. In Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, 2005."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28601-8_41"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"key":"e_1_3_2_2_23_1","volume-title":"ACM SIGCOMM Poster","author":"Roy S.","year":"2007","unstructured":"S. Roy , A. Pathak , and Y. C. Hu . Mitigating the impact of spams by internet content pollution . In ACM SIGCOMM Poster , 2007 . S. Roy, A. Pathak, and Y. C. Hu. Mitigating the impact of spams by internet content pollution. In ACM SIGCOMM Poster, 2007."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495931"},{"key":"e_1_3_2_2_25_1","volume-title":"Anti-Abuse and Spam Conference","author":"Shue C. A.","year":"2009","unstructured":"C. A. Shue , M. Gupta , J. J. Lubia , C. H. Kong , and A. Yuksel . Spamology: A study of spam origins. In Collaboration, Electronic messaging , Anti-Abuse and Spam Conference , 2009 . C. A. Shue, M. Gupta, J. J. Lubia, C. H. Kong, and A. Yuksel. Spamology: A study of spam origins. In Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, 2009."},{"key":"e_1_3_2_2_26_1","volume-title":"Anti-Abuse and Spam Conference","author":"Thomason A.","year":"2007","unstructured":"A. Thomason . Blog spam : A review. In Collaboration, Electronic messaging , Anti-Abuse and Spam Conference , 2007 . A. Thomason. Blog spam: A review. In Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, 2007."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402979"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1817271.1817409"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1039621.1039625"},{"key":"e_1_3_2_2_30_1","first-page":"321","volume-title":"USENIX NSDI","author":"Zhao Y.","year":"2009","unstructured":"Y. Zhao , Y. Xie , F. Yu , Q. Ke , Y. Yu , Y. Chen , and E. Gillum . Botgraph: large scale spamming botnet detection . In USENIX NSDI , pages 321 -- 334 , 2009 . Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum. Botgraph: large scale spamming botnet detection. In USENIX NSDI, pages 321--334, 2009."},{"key":"e_1_3_2_2_31_1","volume-title":"USENIX LEET","author":"Zhuang L.","year":"2008","unstructured":"L. Zhuang , J. Dunagan , D. R. Simon , H. J. Wang , and J. D. Tygar . Characterizing botnets from email spam records . In USENIX LEET , 2008 . L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, and J. D. Tygar. Characterizing botnets from email spam records. In USENIX LEET, 2008."}],"event":{"name":"IMC '12: Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"],"location":"Boston Massachusetts USA","acronym":"IMC '12"},"container-title":["Proceedings of the 2012 Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2398776.2398823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2398776.2398823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:47Z","timestamp":1750234727000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2398776.2398823"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,14]]},"references-count":31,"alternative-id":["10.1145\/2398776.2398823","10.1145\/2398776"],"URL":"https:\/\/doi.org\/10.1145\/2398776.2398823","relation":{},"subject":[],"published":{"date-parts":[[2012,11,14]]},"assertion":[{"value":"2012-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}