{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:13Z","timestamp":1750306633519,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590297","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"27-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Scanner hunter"],"prefix":"10.1145","author":[{"given":"Guowu","family":"Xie","sequence":"first","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Huy","family":"Hang","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Michalis","family":"Faloutsos","sequence":"additional","affiliation":[{"name":"University of New Mexico, Albuquerque, Albuquerque, NM, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"P. Ducklin \"DHS website falls victim to hacktivist intrusion \" http:\/\/nakedsecurity.sophos.com\/2013\/01\/07\/dhs-website-falls-victim-to-hacktivist-intrusion\/ 2013.  P. Ducklin \"DHS website falls victim to hacktivist intrusion \" http:\/\/nakedsecurity.sophos.com\/2013\/01\/07\/dhs-website-falls-victim-to-hacktivist-intrusion\/ 2013."},{"key":"e_1_3_2_1_2_1","volume-title":"Hypertext transfer protocol?http\/1.1","author":"Fielding R.","year":"1999","unstructured":"R. Fielding , J. Gettys , J. Mogul , H. Frystyk , L. Masinter , P. Leach , and T. Berners-Lee , \" Hypertext transfer protocol?http\/1.1 ,\" 1999 . R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee, \"Hypertext transfer protocol?http\/1.1,\" 1999."},{"key":"e_1_3_2_1_3_1","first-page":"25","volume-title":"a. Vigna, \"Pubcrawl: protecting users and businesses from crawlers,\" in Proceedings of the 21st USENIX conference on Security symposium","author":"Jacob G.","year":"2012","unstructured":"G. Jacob , E. Kirda , C. Kruegel , and G. a. Vigna, \"Pubcrawl: protecting users and businesses from crawlers,\" in Proceedings of the 21st USENIX conference on Security symposium . USENIX Association , 2012 , pp. 25 -- 25 . G. Jacob, E. Kirda, C. Kruegel, and G. a. Vigna, \"Pubcrawl: protecting users and businesses from crawlers,\" in Proceedings of the 21st USENIX conference on Security symposium. USENIX Association, 2012, pp. 25--25."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860034"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502550"},{"key":"e_1_3_2_1_6_1","volume-title":"Weka: Practical machine learning tools and techniques with java implementations","author":"Witten I. H.","year":"1999","unstructured":"I. H. Witten , E. Frank , L. E. Trigg , M. A. Hall , G. Holmes , and S. J. Cunningham , \" Weka: Practical machine learning tools and techniques with java implementations ,\" 1999 . I. H. Witten, E. Frank, L. E. Trigg, M. A. Hall, G. Holmes, and S. J. Cunningham, \"Weka: Practical machine learning tools and techniques with java implementations,\" 1999."},{"key":"e_1_3_2_1_7_1","first-page":"1","author":"Eckersley P.","year":"2010","unstructured":"P. Eckersley , \"How unique is your web browser?\" in Privacy Enhancing Technologies. Springer , 2010 , pp. 1 -- 18 . P. Eckersley, \"How unique is your web browser?\" in Privacy Enhancing Technologies. Springer, 2010, pp. 1--18.","journal-title":"Privacy Enhancing Technologies. Springer"},{"key":"e_1_3_2_1_8_1","unstructured":"\"HE BGP Toolkit \" http:\/\/bgp.he.net\/.  \"HE BGP Toolkit \" http:\/\/bgp.he.net\/."},{"key":"e_1_3_2_1_9_1","unstructured":"\"http:\/\/f.virscan.org\/xpymep.exe.html \" http:\/\/f.virscan.org\/xpymep.exe.html.  \"http:\/\/f.virscan.org\/xpymep.exe.html \" http:\/\/f.virscan.org\/xpymep.exe.html."},{"key":"e_1_3_2_1_10_1","unstructured":"\"Wordpress timthumb plugin - remote code execution \" http:\/\/www.exploit-db.com\/exploits\/17602\/.  \"Wordpress timthumb plugin - remote code execution \" http:\/\/www.exploit-db.com\/exploits\/17602\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISP.2006.7"},{"key":"e_1_3_2_1_12_1","first-page":"351","volume-title":"Applying clickstream data mining to real-time web crawler detection and containment using clicktips platform,\" in Advances in Data Analysis","author":"Louren\u00e7o A.","year":"2007","unstructured":"A. Louren\u00e7o and O. Belo , \" Applying clickstream data mining to real-time web crawler detection and containment using clicktips platform,\" in Advances in Data Analysis . Springer , 2007 , pp. 351 -- 358 . A. Louren\u00e7o and O. Belo, \"Applying clickstream data mining to real-time web crawler detection and containment using clicktips platform,\" in Advances in Data Analysis. Springer, 2007, pp. 351--358."},{"key":"e_1_3_2_1_13_1","first-page":"211","volume-title":"Proceedings. 2004 IEEE Symposium on. IEEE","author":"Jung J.","year":"2004","unstructured":"J. Jung , V. Paxson , A. W. Berger , and H. Balakrishnan , \" Fast portscan detection using sequential hypothesis testing,\" in Security and Privacy, 2004 . Proceedings. 2004 IEEE Symposium on. IEEE , 2004 , pp. 211 -- 225 . J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, \"Fast portscan detection using sequential hypothesis testing,\" in Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on. IEEE, 2004, pp. 211--225."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2009","author":"Gates C.","year":"2009","unstructured":"C. Gates , \"Coordinated scans detection,\" in Proceedings of the Network and Distributed System Security Symposium, NDSS 2009 . The Internet Society , 2009 . C. Gates, \"Coordinated scans detection,\" in Proceedings of the Network and Distributed System Security Symposium, NDSS 2009. The Internet Society, 2009."},{"key":"e_1_3_2_1_15_1","unstructured":"N. Provos \"A virtual honeypot framework.\" in USENIX Security Symposium vol. 173 2004.   N. Provos \"A virtual honeypot framework.\" in USENIX Security Symposium vol. 173 2004."},{"key":"e_1_3_2_1_16_1","first-page":"84","volume-title":"Incorporating honeypot for intrusion detection in cloud infrastructure,\" in Trust Management VI","author":"Borisaniya B.","year":"2012","unstructured":"B. Borisaniya , A. Patel , D. R. Patel , and H. Patel , \" Incorporating honeypot for intrusion detection in cloud infrastructure,\" in Trust Management VI . Springer , 2012 , pp. 84 -- 96 . B. Borisaniya, A. Patel, D. R. Patel, and H. Patel, \"Incorporating honeypot for intrusion detection in cloud infrastructure,\" in Trust Management VI. Springer, 2012, pp. 84--96."},{"key":"e_1_3_2_1_17_1","first-page":"26","volume-title":"Enemy of the state: a state-aware black-box web vulnerability scanner,\" in Proceedings of the 21st USENIX conference on Security symposium","author":"Doup\u00e9 A.","year":"2012","unstructured":"A. Doup\u00e9 , L. Cavedon , C. Kruegel , and G. Vigna , \" Enemy of the state: a state-aware black-box web vulnerability scanner,\" in Proceedings of the 21st USENIX conference on Security symposium . USENIX Association , 2012 , pp. 26 -- 26 . A. Doup\u00e9, L. Cavedon, C. Kruegel, and G. Vigna, \"Enemy of the state: a state-aware black-box web vulnerability scanner,\" in Proceedings of the 21st USENIX conference on Security symposium. USENIX Association, 2012, pp. 26--26."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34210-3_3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135817"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030100"},{"key":"e_1_3_2_1_21_1","first-page":"1","volume-title":"IEEE","author":"Xie G.","year":"2013","unstructured":"G. Xie , M. Iliofotou , T. Karagiannis , M. Faloutsos , and Y. Jin , \" Resurf: Reconstructing web-surfing activity from network traffic,\" in IFIP Networking Conference, 2013 . IEEE , 2013 , pp. 1 -- 9 . G. Xie, M. Iliofotou, T. Karagiannis, M. Faloutsos, and Y. Jin, \"Resurf: Reconstructing web-surfing activity from network traffic,\" in IFIP Networking Conference, 2013. IEEE, 2013, pp. 1--9."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060820"}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kyoto Japan","acronym":"ASIA CCS '14"},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590297","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:51Z","timestamp":1750229751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590297"}},"subtitle":["understanding HTTP scanning traffic"],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":22,"alternative-id":["10.1145\/2590296.2590297","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590297","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}