{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:48:48Z","timestamp":1750308528678,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905360","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Advance Persistent Threat"],"prefix":"10.1145","author":[{"given":"Bhavik","family":"Thakar","sequence":"first","affiliation":[{"name":"RakshaShakti University, Ahmedabad, India"}]},{"given":"Chandresh","family":"Parekh","sequence":"additional","affiliation":[{"name":"RakshaShakti University, Ahmedabad, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.091213.00134"},{"volume-title":"ISRO","year":"2014","author":"Paul Tuhin","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"M. Tariq Banday Nisar A. Shah. Study of Botnets and Their Threats to Internet Security University of Kashmir India Jameel A. Qadri BC College of North West London UK http:\/\/sprouts.aisnet.org\/ 9--24  M. Tariq Banday Nisar A. Shah. Study of Botnets and Their Threats to Internet Security University of Kashmir India Jameel A. Qadri BC College of North West London UK http:\/\/sprouts.aisnet.org\/ 9--24"},{"key":"e_1_3_2_1_4_1","unstructured":"G. Kirubavathi and R. Anitha 2014. Botnets: A Study and Analysis. Department of Mathematics and Computational Sciences PSG College of Technology Coimbatore India Springer India 2014  G. Kirubavathi and R. Anitha 2014. Botnets: A Study and Analysis. Department of Mathematics and Computational Sciences PSG College of Technology Coimbatore India Springer India 2014"},{"key":"e_1_3_2_1_5_1","unstructured":"N. Lee 2015. Cyber Warfare: Weapon of Mass Disruption. Counterterrorism and Cyber security DOI 10.1007\/978-3-319-17244-6_9 Springer International Publishing Switzerland 2015  N. Lee 2015. Cyber Warfare: Weapon of Mass Disruption. Counterterrorism and Cyber security DOI 10.1007\/978-3-319-17244-6_9 Springer International Publishing Switzerland 2015"},{"volume-title":"India. IEEE 2015","year":"2015","author":"Hoque N.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2014.26"},{"volume-title":"May 7th","year":"2010","author":"Massi Joseph","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Rain Ottis 2015. Cyber Warfare Tallinn University of Technology Tallinn Estonia Springer International Publishing Switzerland 2015  Rain Ottis 2015. Cyber Warfare Tallinn University of Technology Tallinn Estonia Springer International Publishing Switzerland 2015"},{"key":"e_1_3_2_1_10_1","unstructured":"APT\n\n  \n  : http:\/\/www.mcafee.com\/in\/resources\/white-papers\/wp-combat-advanced-persist-threats.pdf  APT: http:\/\/www.mcafee.com\/in\/resources\/white-papers\/wp-combat-advanced-persist-threats.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"List of Botnet: http:\/\/www.enigmasoftware.com\/top-10-botnet-threats-in-the-united-states\/  List of Botnet: http:\/\/www.enigmasoftware.com\/top-10-botnet-threats-in-the-united-states\/"},{"key":"e_1_3_2_1_12_1","unstructured":"Popular Botnets: http:\/\/www.spywareinfoforum.com\/topic\/136252-pandemic-of-the-botnets-2015\/  Popular Botnets: http:\/\/www.spywareinfoforum.com\/topic\/136252-pandemic-of-the-botnets-2015\/"},{"key":"e_1_3_2_1_13_1","unstructured":"Botnet Threat Report: http:\/\/www.symantec.com\/security_response\/publications\/threatreport.jsp  Botnet Threat Report: http:\/\/www.symantec.com\/security_response\/publications\/threatreport.jsp"},{"key":"e_1_3_2_1_14_1","unstructured":"Botnet Introduction:http:\/\/www.microsoft.com\/security\/pc-security\/botnet.aspx  Botnet Introduction:http:\/\/www.microsoft.com\/security\/pc-security\/botnet.aspx"},{"key":"e_1_3_2_1_15_1","unstructured":"Old Botnets: http:\/\/www.pearsonitcertification.com\/articles\/article.aspx?p=1703672  Old Botnets: http:\/\/www.pearsonitcertification.com\/articles\/article.aspx?p=1703672"},{"key":"e_1_3_2_1_16_1","unstructured":"Brief Botware activity: https:\/\/www.shadowserver.org\/wiki\/pmwiki.php\/Stats\/BotnetCharts  Brief Botware activity: https:\/\/www.shadowserver.org\/wiki\/pmwiki.php\/Stats\/BotnetCharts"},{"key":"e_1_3_2_1_17_1","unstructured":"C&C Architecture: http:\/\/resources.infosecinstitute.com\/botnets-how-do-they-work-architectures-and-case-studies-part-2\/  C&C Architecture: http:\/\/resources.infosecinstitute.com\/botnets-how-do-they-work-architectures-and-case-studies-part-2\/"},{"key":"e_1_3_2_1_18_1","unstructured":"Bot Communication: https:\/\/www.damballa.com\/downloads\/r_pubs\/WP_Botnet_Communications_Primer.pdf  Bot Communication: https:\/\/www.damballa.com\/downloads\/r_pubs\/WP_Botnet_Communications_Primer.pdf"},{"key":"e_1_3_2_1_19_1","unstructured":"APT Brief: http:\/\/www.fortinet.com\/sites\/default\/files\/solutionbrief\/threats-on-the-horizon-rise-of-advanced-persistent-threats.pdf  APT Brief: http:\/\/www.fortinet.com\/sites\/default\/files\/solutionbrief\/threats-on-the-horizon-rise-of-advanced-persistent-threats.pdf"},{"key":"e_1_3_2_1_20_1","unstructured":"APT introduction: https:\/\/apt.securelist.com\/#firstPage  APT introduction: https:\/\/apt.securelist.com\/#firstPage"},{"key":"e_1_3_2_1_21_1","unstructured":"Country wise bot activity: http:\/\/media.kaspersky.com\/en\/business-security\/APT-Report.pdf?icid=en-GL:ent-gallery  Country wise bot activity: http:\/\/media.kaspersky.com\/en\/business-security\/APT-Report.pdf?icid=en-GL:ent-gallery"},{"key":"e_1_3_2_1_22_1","unstructured":"APT anatomy: https:\/\/www.websense.com\/assets\/white-papers\/whitepaper-websense-advanced-persistent-threats-and-other-advanced-attacks-en.pdf  APT anatomy: https:\/\/www.websense.com\/assets\/white-papers\/whitepaper-websense-advanced-persistent-threats-and-other-advanced-attacks-en.pdf"},{"key":"e_1_3_2_1_23_1","unstructured":"Sources of attack: 2015 Bot Baseline ANA & WHITE OPS  Sources of attack: 2015 Bot Baseline ANA & WHITE OPS"},{"key":"e_1_3_2_1_24_1","unstructured":"DDOS by Botnet: https:\/\/securelist.com\/files\/2015\/05\/Statistics_on_botnet-assisted_DDoS_attacks_in_Q1_2015.pdf  DDOS by Botnet: https:\/\/securelist.com\/files\/2015\/05\/Statistics_on_botnet-assisted_DDoS_attacks_in_Q1_2015.pdf"},{"key":"e_1_3_2_1_25_1","unstructured":"2015 bot activity: https:\/\/www4.symantec.com\/mktginfo\/whitepaper\/ISTR\/21347931_GA-internet-security-threat-report-volume-20-2015-appendices.pdf  2015 bot activity: https:\/\/www4.symantec.com\/mktginfo\/whitepaper\/ISTR\/21347931_GA-internet-security-threat-report-volume-20-2015-appendices.pdf"},{"key":"e_1_3_2_1_26_1","unstructured":"List of Bot attacks: http:\/\/www.botfree.ro\/en\/article-botnet-assisted-attacks.html  List of Bot attacks: http:\/\/www.botfree.ro\/en\/article-botnet-assisted-attacks.html"},{"key":"e_1_3_2_1_27_1","unstructured":"Sector of bot attacks: http:\/\/www.mcafee.com\/in\/resources\/white-papers\/wp-new-era-of-botnets.pdf  Sector of bot attacks: http:\/\/www.mcafee.com\/in\/resources\/white-papers\/wp-new-era-of-botnets.pdf"},{"key":"e_1_3_2_1_28_1","unstructured":"Bot activity monitor: http:\/\/public.dhe.ibm.com\/common\/ssi\/ecm\/wg\/en\/wgw03057usen\/WGW03057USEN.PDF?  Bot activity monitor: http:\/\/public.dhe.ibm.com\/common\/ssi\/ecm\/wg\/en\/wgw03057usen\/WGW03057USEN.PDF?"},{"key":"e_1_3_2_1_29_1","unstructured":"Introduction of Bot architecture: Anatomy of a Botnet fortinet whitepaper www.fortinet.com  Introduction of Bot architecture: Anatomy of a Botnet fortinet whitepaper www.fortinet.com"},{"key":"e_1_3_2_1_30_1","unstructured":"Definitions of APT: and Advanced Persistent Threat Awareness ISACA trend micro WWW.ISACA.ORG\/CYBERSECURITY  Definitions of APT: and Advanced Persistent Threat Awareness ISACA trend micro WWW.ISACA.ORG\/CYBERSECURITY"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905360","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:55:49Z","timestamp":1750272949000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905360"}},"subtitle":["Botnet"],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":30,"alternative-id":["10.1145\/2905055.2905360","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905360","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}