{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:11Z","timestamp":1750221311808,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,24]],"date-time":"2017-11-24T00:00:00Z","timestamp":1511481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,24]]},"DOI":"10.1145\/3163058.3163061","type":"proceedings-article","created":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T13:15:02Z","timestamp":1516281302000},"page":"67-75","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Doctrina"],"prefix":"10.1145","author":[{"given":"Sheng-Yu","family":"Chen","sequence":"first","affiliation":[{"name":"Information &amp; Communication Security Laboratory, Chunghwa Telecom Laboratories, Chung-Li, Taiwan, R.O.C."}]},{"given":"Tzung-Han","family":"Jeng","sequence":"additional","affiliation":[{"name":"Information &amp; Communication Security Laboratory, Chunghwa Telecom Laboratories, Chung-Li, Taiwan, R.O.C."}]},{"given":"Chuan-Chiang","family":"Huang","sequence":"additional","affiliation":[{"name":"Information &amp; Communication Security Laboratory, Chunghwa Telecom Laboratories, Chung-Li, Taiwan, R.O.C."}]},{"given":"Chien-Chih","family":"Chen","sequence":"additional","affiliation":[{"name":"Information &amp; Communication Security Laboratory, Chunghwa Telecom Laboratories, Chung-Li, Taiwan, R.O.C."}]},{"given":"Kuo-Sen","family":"Chou","sequence":"additional","affiliation":[{"name":"Information &amp; Communication Security Laboratory, Chunghwa Telecom Laboratories, Chung-Li, Taiwan, R.O.C."}]}],"member":"320","published-online":{"date-parts":[[2017,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"P. Mockapetris \"Domain names - concepts and facilities \" https:\/\/tools.ietf.org\/html\/rfc1034 Nov. 1987.   P. Mockapetris \"Domain names - concepts and facilities \" https:\/\/tools.ietf.org\/html\/rfc1034 Nov. 1987.","DOI":"10.17487\/rfc1034"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"P. Mockapetris \"Domain names - implementation and specification \" https:\/\/tools.ietf.org\/html\/rfc1035 Nov. 1987.   P. Mockapetris \"Domain names - implementation and specification \" https:\/\/tools.ietf.org\/html\/rfc1035 Nov. 1987.","DOI":"10.17487\/rfc1035"},{"key":"e_1_3_2_1_3_1","unstructured":"Infoblox \"DNS Threat Index \" https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-white-paper-dns-threat-index-q1-2016-report.pdf Apr. 2016.  Infoblox \"DNS Threat Index \" https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-white-paper-dns-threat-index-q1-2016-report.pdf Apr. 2016."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2458581"},{"key":"e_1_3_2_1_5_1","volume-title":"Aveiro","author":"Chen P.","year":"2014","unstructured":"P. Chen , L. Desmet , and C. Huygens , \" A study on advanced persistent threats,\" 15th IFIP international conference on communications and multimedia security (CMS) , Aveiro , Portugal , Sep 2014 . P. Chen, L. Desmet, and C. Huygens, \"A study on advanced persistent threats,\" 15th IFIP international conference on communications and multimedia security (CMS), Aveiro, Portugal, Sep 2014."},{"key":"e_1_3_2_1_6_1","volume-title":"Advanced Persistent Threat (APT) beyond the hype,\" IMT4582 network security","author":"Ask M.","year":"2013","unstructured":"M. Ask , P. Bondarenko , J. E. Rekdal , A. Nordb\u00f8 , P. Bloemerus , and D. Piatkivskyi , \" Advanced Persistent Threat (APT) beyond the hype,\" IMT4582 network security , Springer , Berlin, Germany , 2013 . M. Ask, P. Bondarenko, J. E. Rekdal, A. Nordb\u00f8, P. Bloemerus, and D. Piatkivskyi, \"Advanced Persistent Threat (APT) beyond the hype,\" IMT4582 network security, Springer, Berlin, Germany, 2013."},{"key":"e_1_3_2_1_7_1","first-page":"39","volume-title":"understanding, detecting, and disrupting botnets,\" in proceeding of the steps to reducing unwanted traffic on the internet workshop (SRUTI'05)","author":"Cooke E.","year":"2005","unstructured":"E. Cooke , F. Jahanian , and D. McPherson , \" The Zombie roundup : understanding, detecting, and disrupting botnets,\" in proceeding of the steps to reducing unwanted traffic on the internet workshop (SRUTI'05) , pp. 39 -- 44 , 2005 . E. Cooke, F. Jahanian, and D. McPherson, \"The Zombie roundup: understanding, detecting, and disrupting botnets,\" in proceeding of the steps to reducing unwanted traffic on the internet workshop (SRUTI'05), pp. 39--44, 2005."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"17th Annual FIRST conference","author":"Weimer F.","year":"2005","unstructured":"F. Weimer , \" Passive DNS replication,\" 17th Annual FIRST conference , Singapore , pp. 1 -- 13 , Jun. 26--Jul. 1, 2005 . F. Weimer, \"Passive DNS replication,\" 17th Annual FIRST conference, Singapore, pp. 1--13, Jun. 26--Jul. 1, 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2015.86"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Hong K. F. Chen C. C. Chiu T. T and Chou K. S. 2015b \"Scalable Command and Control Detection in Log Data through UF-ICF Analysis \" in International Carnahan Conference On Security Technology 293--298.  Hong K. F. Chen C. C. Chiu T. T and Chou K. S. 2015b \"Scalable Command and Control Detection in Log Data through UF-ICF Analysis \" in International Carnahan Conference On Security Technology 293--298.","DOI":"10.1109\/CCST.2015.7389699"},{"key":"e_1_3_2_1_11_1","volume-title":"Behavior-Based Tracking of Network Traffic for Malware-Control Domain Detection\" IEEE BigDataService","author":"Sun Jia-Hao","year":"2017","unstructured":"Jia-Hao Sun , Tzung-Han Jeng , Chien-Chih Chen , Hsiu-Chuan Huang , Kuo-Sen Chou . \"MD-Miner : Behavior-Based Tracking of Network Traffic for Malware-Control Domain Detection\" IEEE BigDataService 2017 . Jia-Hao Sun, Tzung-Han Jeng, Chien-Chih Chen, Hsiu-Chuan Huang, Kuo-Sen Chou. \"MD-Miner: Behavior-Based Tracking of Network Traffic for Malware-Control Domain Detection\" IEEE BigDataService 2017."},{"key":"e_1_3_2_1_12_1","first-page":"273","volume-title":"DC","author":"Antonakakis M.","year":"2010","unstructured":"M. Antonakakis , R. Perdisci , D. Dagon , W. Lee , and N. Feamster , \" Building a dynamic reputation system for DNS,\" 19th USENIX conference on security, Washington , DC , pp. 273 -- 290 , Aug. 11 --13 , 2010 . M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster, \"Building a dynamic reputation system for DNS,\" 19th USENIX conference on security, Washington, DC, pp. 273--290, Aug. 11--13, 2010."},{"key":"e_1_3_2_1_13_1","volume-title":"Detecting malware domains at the upper DNS hierarchy,\" 20th USENIX conference on security","author":"Antonakakis M.","year":"2011","unstructured":"M. Antonakakis , R. Perdisci , W. Lee , N. Vasiloglou , and D. Dagon , \" Detecting malware domains at the upper DNS hierarchy,\" 20th USENIX conference on security , San Francisco, CA , Aug. 08--12, 2011 . M. Antonakakis, R. Perdisci, W. Lee, N. Vasiloglou, and D. Dagon, \"Detecting malware domains at the upper DNS hierarchy,\" 20th USENIX conference on security, San Francisco, CA, Aug. 08--12, 2011."},{"key":"e_1_3_2_1_14_1","volume-title":"CA","author":"Bilge L.","year":"2011","unstructured":"L. Bilge , E. Kirda , C. Kruegel , and M. Balduzzi , \" EXPOSURE: Finding malicious domains using passive DNS analysis,\" 18th Annual network and distributed system security symposium, San Diego , CA , Feb. 06-09, 2011 . L. Bilge, E. Kirda, C. Kruegel, and M. Balduzzi, \"EXPOSURE: Finding malicious domains using passive DNS analysis,\" 18th Annual network and distributed system security symposium, San Diego, CA, Feb. 06-09, 2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2584679"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.35"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314391"},{"key":"e_1_3_2_1_18_1","volume-title":"Texas","author":"Guerid H.","year":"2013","unstructured":"H. Guerid , K. Mittig , and A. Serhrouchni , \" Collaborative approach for inter-domain botnet detection in large-scale networks,\" 9th International conference on collaborative computing: networking, applications and worksharing, Austin , Texas , United States , Oct. 20-23, 2013 . H. Guerid, K. Mittig, and A. Serhrouchni, \"Collaborative approach for inter-domain botnet detection in large-scale networks,\" 9th International conference on collaborative computing: networking, applications and worksharing, Austin, Texas, United States, Oct. 20-23, 2013."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879148"},{"key":"e_1_3_2_1_20_1","first-page":"491","volume-title":"WA","author":"Antonakakis M.","year":"2012","unstructured":"M. Antonakakis , R. Perdisci , Y. Nadji , N. Vasiloglou , S. Abu-Nimeh , W. Lee , and D. Dagon , \" From throw-away traffic to bots: detecting the rise of DGA-based malware,\" 21st USENIX conference on security symposium, Bellevue , WA , pp. 491 -- 506 , Aug. 08 --10 , 2012 . M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-Nimeh, W. Lee, and D. Dagon, \"From throw-away traffic to bots: detecting the rise of DGA-based malware,\" 21st USENIX conference on security symposium, Bellevue, WA, pp. 491--506, Aug. 08--10, 2012."}],"event":{"name":"ICCNS 2017: 2017 the 7th International Conference on Communication and Network Security","sponsor":["University of Electronic Science and Technology of China University of Electronic Science and Technology of China"],"location":"Tokyo Japan","acronym":"ICCNS 2017"},"container-title":["Proceedings of the 2017 7th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3163058.3163061","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3163058.3163061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:38Z","timestamp":1750212818000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3163058.3163061"}},"subtitle":["Annotated Bipartite Graph Mining for Malware-Control Domain Detection"],"short-title":[],"issued":{"date-parts":[[2017,11,24]]},"references-count":20,"alternative-id":["10.1145\/3163058.3163061","10.1145\/3163058"],"URL":"https:\/\/doi.org\/10.1145\/3163058.3163061","relation":{},"subject":[],"published":{"date-parts":[[2017,11,24]]},"assertion":[{"value":"2017-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}