{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:06Z","timestamp":1772164086400,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,17]],"date-time":"2015-08-17T00:00:00Z","timestamp":1439769600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,17]]},"DOI":"10.1145\/2785956.2787494","type":"proceedings-article","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T10:09:20Z","timestamp":1440410960000},"page":"625-638","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["ASwatch"],"prefix":"10.1145","author":[{"given":"Maria","family":"Konte","sequence":"first","affiliation":[{"name":"Georgia Tech, Atlanta, GA, USA"}]},{"given":"Roberto","family":"Perdisci","sequence":"additional","affiliation":[{"name":"University of Georgia, Athens, GA, USA"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,8,17]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Mar.","year":"2010","unstructured":"abuse.ch. And Another Bulletproof Hosting AS Goes Offline , Mar. 2010 . http:\/\/www.abuse.ch\/?p=2496. abuse.ch. And Another Bulletproof Hosting AS Goes Offline, Mar. 2010. http:\/\/www.abuse.ch\/?p=2496."},{"key":"e_1_3_2_2_2_1","unstructured":"abuse.ch. 2011: A Bad Start For Cybercriminals: 14 Rogue ISPs Disconnected. http:\/\/www.abuse.ch\/?tag=vline-telecom Jan. 2011.  abuse.ch. 2011: A Bad Start For Cybercriminals: 14 Rogue ISPs Disconnected. http:\/\/www.abuse.ch\/?tag=vline-telecom Jan. 2011."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2012.6260835"},{"key":"e_1_3_2_2_4_1","unstructured":"BGP Ranking. http:\/\/bgpranking.circl.lu\/.  BGP Ranking. http:\/\/bgpranking.circl.lu\/."},{"key":"e_1_3_2_2_5_1","unstructured":"Bgp ranking reports. http:\/\/bgpranking.circl.lu\/.  Bgp ranking reports. http:\/\/bgpranking.circl.lu\/."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_2_7_1","unstructured":"Bulletproof Hosting. http:\/\/en.wikipedia.org\/wiki\/Bulletproof_hosting. Wikipedia.  Bulletproof Hosting. http:\/\/en.wikipedia.org\/wiki\/Bulletproof_hosting. Wikipedia."},{"key":"e_1_3_2_2_8_1","volume-title":"Workshop on Understanding Botnets","author":"Chiang K.","year":"2007","unstructured":"K. Chiang and L. Lloyd . A case study of the Rustock rootkit and spam bot . In Workshop on Understanding Botnets , 2007 . K. Chiang and L. Lloyd. A case study of the Rustock rootkit and spam bot. In Workshop on Understanding Botnets, 2007."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298319"},{"key":"e_1_3_2_2_10_1","unstructured":"Criminal service providers. http:\/\/cyberthreat.wordpress.com\/category\/criminal-service-providers\/.  Criminal service providers. http:\/\/cyberthreat.wordpress.com\/category\/criminal-service-providers\/."},{"key":"e_1_3_2_2_11_1","unstructured":"DShield: Internet Storm Center - Internet Security. www.dshield.org\/?  DShield: Internet Storm Center - Internet Security. www.dshield.org\/?"},{"key":"e_1_3_2_2_12_1","volume-title":"Conference on Email and Anti-Spam (CEAS)","author":"Li F.","year":"2006","unstructured":"F. Li and M. Hsieh . An empirical study of clustering behavior of spammers and group-based anti-spam strategies . In Conference on Email and Anti-Spam (CEAS) , 2006 . F.Li and M. Hsieh. An empirical study of clustering behavior of spammers and group-based anti-spam strategies. In Conference on Email and Anti-Spam (CEAS), 2006."},{"key":"e_1_3_2_2_13_1","volume-title":"May","year":"2010","unstructured":"Hostexploit. AS50896-PROXIEZ Overview of a crime server , May 2010 . http:\/\/goo.gl\/AYGKAQ. Hostexploit. AS50896-PROXIEZ Overview of a crime server, May 2010. http:\/\/goo.gl\/AYGKAQ."},{"key":"e_1_3_2_2_14_1","unstructured":"Hostexploit June 2011. http:\/\/hostexploit.com\/.  Hostexploit June 2011. http:\/\/hostexploit.com\/."},{"key":"e_1_3_2_2_15_1","volume-title":"Mar.","year":"2014","unstructured":"Hostexploit. World Hosts Report. Technical report , Mar. 2014 . http:\/\/hostexploit.com\/downloads\/summary\/7-public-reports\/52-world-hosts-report-march-2014.html. Hostexploit. World Hosts Report. Technical report, Mar. 2014. http:\/\/hostexploit.com\/downloads\/summary\/7-public-reports\/52-world-hosts-report-march-2014.html."},{"key":"e_1_3_2_2_16_1","unstructured":"Crimeware-firendly ISPs. http:\/\/hphosts.blogspot.com\/2010\/02\/crimeware-friendly-isps-cogent-psi.html.  Crimeware-firendly ISPs. http:\/\/hphosts.blogspot.com\/2010\/02\/crimeware-friendly-isps-cogent-psi.html."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_8"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833581"},{"key":"e_1_3_2_2_19_1","unstructured":"J. Kirk. ISP Cut Off from Internet After Security Concerns. http:\/\/www.pcworld.com\/article\/153734\/mccolo_isp_security.html Nov. 2008. PC World.  J. Kirk. ISP Cut Off from Internet After Security Concerns. http:\/\/www.pcworld.com\/article\/153734\/mccolo_isp_security.html Nov. 2008. PC World."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28537-0_12"},{"key":"e_1_3_2_2_21_1","unstructured":"B. Krebs. Russian Business Network: Down But Not Out. http:\/\/goo.gl\/6ITJwP Nov. 2007. Washington Post.  B. Krebs. Russian Business Network: Down But Not Out. http:\/\/goo.gl\/6ITJwP Nov. 2007. Washington Post."},{"key":"e_1_3_2_2_22_1","unstructured":"B. Krebs. Host of Internet Spam Groups Is Cut Off. http:\/\/goo.gl\/8J5P89 Nov. 2008. Washington Post.  B. Krebs. Host of Internet Spam Groups Is Cut Off. http:\/\/goo.gl\/8J5P89 Nov. 2008. Washington Post."},{"key":"e_1_3_2_2_23_1","volume-title":"Mar.","author":"Krebs B.","year":"2010","unstructured":"B. Krebs . Dozens of ZeuS Botnets Knocked Offline , Mar. 2010 . http:\/\/krebsonsecurity.com\/2010\/03\/dozens-of-zeus-botnets-knocked-offline\/. B. Krebs. Dozens of ZeuS Botnets Knocked Offline, Mar. 2010. http:\/\/krebsonsecurity.com\/2010\/03\/dozens-of-zeus-botnets-knocked-offline\/."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232919.1232921"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504735"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575169"},{"key":"e_1_3_2_2_27_1","unstructured":"R. McMillan. After Takedown Botnet-linked ISP Troyak Resurfaces. http:\/\/goo.gl\/5k0OV1 Mar. 2010. Computer World.  R. McMillan. After Takedown Botnet-linked ISP Troyak Resurfaces. http:\/\/goo.gl\/5k0OV1 Mar. 2010. Computer World."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557160"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315288"},{"key":"e_1_3_2_2_31_1","unstructured":"The Russian Business Network. http:\/\/en.wikipedia.org\/wiki\/Russian_Business_Network.  The Russian Business Network. http:\/\/en.wikipedia.org\/wiki\/Russian_Business_Network."},{"key":"e_1_3_2_2_32_1","unstructured":"The RouteViews Project. www.routeviews.org\/.  The RouteViews Project. www.routeviews.org\/."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016910"},{"key":"e_1_3_2_2_34_1","unstructured":"Sitevet. http:\/\/sitevet.com\/.  Sitevet. http:\/\/sitevet.com\/."},{"key":"e_1_3_2_2_35_1","unstructured":"Spamhaus. www.spamhaus.org.  Spamhaus. www.spamhaus.org."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.29"},{"key":"e_1_3_2_2_37_1","first-page":"260","volume-title":"IFIP\/IEEE International Sympososium on Integrated Network Management","author":"Wagner C.","year":"2013","unstructured":"C. Wagner , J. Francois , R. State , A. Dulaunoy , T. Engel , and G. Massen . ASMATRA: Ranking ASes providing transit ser- vice to malware hosters . In IFIP\/IEEE International Sympososium on Integrated Network Management , pages 260 -- 268 , 2013 . C. Wagner, J. Francois, R. State, A. Dulaunoy, T. Engel, and G. Massen. ASMATRA: Ranking ASes providing transit ser- vice to malware hosters. In IFIP\/IEEE International Sympososium on Integrated Network Management, pages 260--268, 2013."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402979"},{"key":"e_1_3_2_2_39_1","volume-title":"Proceedings of the 21st Annual Network & Distributed System Security Symposium (NDSS '14)","author":"Zhang J.","year":"2013","unstructured":"J. Zhang , Z. Durumeric , M. Bailey , M. Karir , and M. Liu . On the Mismanagement and Maliciousness of Networks . In Proceedings of the 21st Annual Network & Distributed System Security Symposium (NDSS '14) , San Diego, California, USA , February 2013 . J. Zhang, Z. Durumeric, M. Bailey, M. Karir, and M. Liu. On the Mismanagement and Maliciousness of Networks. In Proceedings of the 21st Annual Network & Distributed System Security Symposium (NDSS '14), San Diego, California, USA, February 2013."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080189"}],"event":{"name":"SIGCOMM '15: ACM SIGCOMM 2015 Conference","location":"London United Kingdom","acronym":"SIGCOMM '15","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2785956.2787494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2785956.2787494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:42:38Z","timestamp":1750210958000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2785956.2787494"}},"subtitle":["An AS Reputation System to Expose Bulletproof Hosting ASes"],"short-title":[],"issued":{"date-parts":[[2015,8,17]]},"references-count":40,"alternative-id":["10.1145\/2785956.2787494","10.1145\/2785956"],"URL":"https:\/\/doi.org\/10.1145\/2785956.2787494","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2829988.2787494","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,8,17]]},"assertion":[{"value":"2015-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}