{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T04:23:21Z","timestamp":1754195001481,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,16]],"date-time":"2018-03-16T00:00:00Z","timestamp":1521158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,16]]},"DOI":"10.1145\/3199478.3199505","type":"proceedings-article","created":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T16:26:42Z","timestamp":1531240002000},"page":"105-109","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Detecting Network Security Threats Using Domain Name System and NetFlow Traffic"],"prefix":"10.1145","author":[{"given":"Rinkel","family":"Hananto","sequence":"first","affiliation":[{"name":"Swiss German University, Kota Tangerang, Banten, Indonesia"}]},{"given":"Charles","family":"Lim","sequence":"additional","affiliation":[{"name":"Swiss German University, Kota Tangerang, Banten, Indonesia"}]},{"given":"Heru Purnomo","family":"Ipung","sequence":"additional","affiliation":[{"name":"Swiss German University, Kota Tangerang, Banten, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2018,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"N. Woolf \"DDoS attack that disrupted internet was largest of its kind in history experts say \" 26-Oct-2016. {Online}. Available: https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/ddos-attack-dyn-mirai-botnet.  N. Woolf \"DDoS attack that disrupted internet was largest of its kind in history experts say \" 26-Oct-2016. {Online}. Available: https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/ddos-attack-dyn-mirai-botnet."},{"key":"e_1_3_2_1_2_1","unstructured":"D. Etherington and K. Conger \"Large DDoS attacks cause outages at Twitter Spotify and other sites \" 20-Nov-2016. {Online}. Available: http:\/\/social.techcrunch.com\/2016\/10\/21\/many-sites-including-twitter-and-spotify-suffering-outage\/.  D. Etherington and K. Conger \"Large DDoS attacks cause outages at Twitter Spotify and other sites \" 20-Nov-2016. {Online}. Available: http:\/\/social.techcrunch.com\/2016\/10\/21\/many-sites-including-twitter-and-spotify-suffering-outage\/."},{"key":"e_1_3_2_1_3_1","first-page":"147","volume-title":"2016 International Conference on","author":"Santosa K. I.","year":"2016","unstructured":"K. I. Santosa , C. Lim , and A. Erwin , \" Analysis of educational institution DNS network traffic for insider threats,\" in Computer, Control, Informatics and its Applications (IC3INA) , 2016 International Conference on , 2016 , pp. 147 -- 152 . {Online}. Available : K. I. Santosa, C. Lim, and A. Erwin, \"Analysis of educational institution DNS network traffic for insider threats,\" in Computer, Control, Informatics and its Applications (IC3INA), 2016 International Conference on, 2016, pp. 147--152. {Online}. Available:"},{"key":"e_1_3_2_1_4_1","unstructured":"Symantec \"Internet Security Threat Report 22 \" Apr-2017. {Online}. Available: https:\/\/www.symantec.com\/security-center\/threat-report.  Symantec \"Internet Security Threat Report 22 \" Apr-2017. {Online}. Available: https:\/\/www.symantec.com\/security-center\/threat-report."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.793"},{"key":"e_1_3_2_1_6_1","volume-title":"Detecting hidden anomalies in DNS communication,\" Casalicchio E DNS EASY","author":"Mikle O.","year":"2011","unstructured":"O. Mikle , K. Slany , J. Vesely , T. Janou\u0161ek , and O. Sury , \" Detecting hidden anomalies in DNS communication,\" Casalicchio E DNS EASY , 2011 . O. Mikle, K. Slany, J. Vesely, T. Janou\u0161ek, and O. Sury, \"Detecting hidden anomalies in DNS communication,\" Casalicchio E DNS EASY, 2011."},{"key":"e_1_3_2_1_7_1","first-page":"391","volume-title":"2015 International","author":"Rinc\u00f3n S. R.","year":"2015","unstructured":"S. R. Rinc\u00f3n , S. Vaton , A. Beugnard , and S. Garlatti , \" Semantics based analysis of botnet activity from heterogeneous data sources,\" in Wireless Communications and Mobile Computing Conference (IWCMC) , 2015 International , 2015 , pp. 391 -- 396 . S. R. Rinc\u00f3n, S. Vaton, A. Beugnard, and S. Garlatti, \"Semantics based analysis of botnet activity from heterogeneous data sources,\" in Wireless Communications and Mobile Computing Conference (IWCMC), 2015 International, 2015, pp. 391--396."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.10.001"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0331-3"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080118"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080112"},{"key":"e_1_3_2_1_12_1","first-page":"1588","volume-title":"ICC'08","author":"Yuan J.","year":"2008","unstructured":"J. Yuan , Z. Li , and R. Yuan , \" Information entropy based clustering method for unsupervised internet traffic classification,\" in Communications, 2008 . ICC'08 . IEEE International Conference on , 2008 , pp. 1588 -- 1592 . J. Yuan, Z. Li, and R. Yuan, \"Information entropy based clustering method for unsupervised internet traffic classification,\" in Communications, 2008. ICC'08. IEEE International Conference on, 2008, pp. 1588--1592."},{"key":"e_1_3_2_1_13_1","first-page":"3814","volume-title":"2005 IEEE","author":"Amidan B. G.","year":"2005","unstructured":"B. G. Amidan , T. A. Ferryman , and S. K. Cooley , \" Data outlier detection using the Chebyshev theorem,\" in Aerospace Conference , 2005 IEEE , 2005 , pp. 3814 -- 3819 . B. G. Amidan, T. A. Ferryman, and S. K. Cooley, \"Data outlier detection using the Chebyshev theorem,\" in Aerospace Conference, 2005 IEEE, 2005, pp. 3814--3819."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2010.153"},{"key":"e_1_3_2_1_15_1","volume-title":"New Age International","author":"Singh Y. K.","year":"2006","unstructured":"Y. K. Singh , Fundamental of research methodology and statistics . New Age International , 2006 . Y. K. Singh, Fundamental of research methodology and statistics. New Age International, 2006."},{"key":"e_1_3_2_1_16_1","unstructured":"FarSight Security \"nmsgtool \" 2013. {Online}. Available: https:\/\/archive.farsightsecurity.com\/nmsgtool\/.  FarSight Security \"nmsgtool \" 2013. {Online}. Available: https:\/\/archive.farsightsecurity.com\/nmsgtool\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"e_1_3_2_1_18_1","volume-title":"Detecting dns tunnels using character frequency analysis,\" ArXiv Prepr. ArXiv10044358","author":"Born K.","year":"2010","unstructured":"K. Born and D. Gustafson , \" Detecting dns tunnels using character frequency analysis,\" ArXiv Prepr. ArXiv10044358 , 2010 . K. Born and D. Gustafson, \"Detecting dns tunnels using character frequency analysis,\" ArXiv Prepr. ArXiv10044358, 2010."},{"issue":"2","key":"e_1_3_2_1_19_1","first-page":"140","article-title":"Employing machine learning algorithms to detect unknown scanning and email worms","volume":"11","author":"Abdulla S.","year":"2014","unstructured":"S. Abdulla , S. Ramadass , A. A. Altyeb , and A. Al-Nassiri , \" Employing machine learning algorithms to detect unknown scanning and email worms .,\" Int Arab J Inf Technol , vol. 11 , no. 2 , pp. 140 -- 148 , 2014 . S. Abdulla, S. Ramadass, A. A. Altyeb, and A. Al-Nassiri, \"Employing machine learning algorithms to detect unknown scanning and email worms.,\" Int Arab J Inf Technol, vol. 11, no. 2, pp. 140--148, 2014.","journal-title":"Int Arab J Inf Technol"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2014.18"}],"event":{"name":"ICCSP 2018: 2018 the 2nd International Conference on Cryptography, Security and Privacy","sponsor":["Wuhan Univ. Wuhan University, China","University of Electronic Science and Technology of China University of Electronic Science and Technology of China"],"location":"Guiyang China","acronym":"ICCSP 2018"},"container-title":["Proceedings of the 2nd International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3199478.3199505","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3199478.3199505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:51Z","timestamp":1750210791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3199478.3199505"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,16]]},"references-count":20,"alternative-id":["10.1145\/3199478.3199505","10.1145\/3199478"],"URL":"https:\/\/doi.org\/10.1145\/3199478.3199505","relation":{},"subject":[],"published":{"date-parts":[[2018,3,16]]},"assertion":[{"value":"2018-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}