{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:02:48Z","timestamp":1766484168850,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.1145\/3429789.3429818","type":"proceedings-article","created":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T20:52:56Z","timestamp":1606423976000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Botnet Detection Using DNS and HTTP Traffic Analysis"],"prefix":"10.1145","author":[{"given":"Agung","family":"Udiyono","sequence":"first","affiliation":[{"name":"Swiss German University, Tangerang, Banten, Indonesia"}]},{"given":"Charles","family":"Lim","sequence":"additional","affiliation":[{"name":"Swiss German University, Tangerang, Banten, Indonesia"}]},{"family":"Lukas","sequence":"additional","affiliation":[{"name":"Cognitive Engineering Research Group (CERG), Universitas Katolik Atma Jaya, Jakarta, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69155-8_1"},{"key":"e_1_3_2_1_2_1","unstructured":"AV-TEST. 2019. Malware Statistics & Trends Report \/ AV-TEST. Retrieved 2019-12-17 from https:\/\/www.av-test.org\/en\/statistics\/malware\/  AV-TEST. 2019. Malware Statistics & Trends Report \/ AV-TEST. Retrieved 2019-12-17 from https:\/\/www.av-test.org\/en\/statistics\/malware\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2584679"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiCOM.2012.6478491"},{"volume-title":"Botnet detection using passive DNS. Master's thesis","author":"da Pedro Marques Luz P","key":"e_1_3_2_1_5_1","unstructured":"P da Pedro Marques Luz . 2014. Botnet detection using passive DNS. Master's thesis . Radboud University , Nijmegen, The Netherlands. P da Pedro Marques Luz. 2014. Botnet detection using passive DNS. Master's thesis. Radboud University, Nijmegen, The Netherlands."},{"key":"e_1_3_2_1_6_1","volume-title":"BotSniffer: Detecting botnet command and control channels in network traffic. Network and Distributed System Security 53, 1 (01","author":"Gu Guofei","year":"2008","unstructured":"Guofei Gu , Junjie Zhang , and Wenke Lee . 2008. BotSniffer: Detecting botnet command and control channels in network traffic. Network and Distributed System Security 53, 1 (01 2008 ), 1--13. https:\/\/doi.org\/10.1.1.110.8092 Guofei Gu, Junjie Zhang, and Wenke Lee. 2008. BotSniffer: Detecting botnet command and control channels in network traffic. Network and Distributed System Security 53, 1 (01 2008), 1--13. https:\/\/doi.org\/10.1.1.110.8092"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1558977.1558997"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2013.07.006"},{"key":"e_1_3_2_1_9_1","volume-title":"Bro: a system for detecting network intruders in real-time. Computer networks 31","author":"Paxson Vern","year":"1999","unstructured":"Vern Paxson . 1999. Bro: a system for detecting network intruders in real-time. Computer networks 31 ( 1999 ), 2435--2463. https:\/\/doi.org\/10.1016\/S1389-1286(99)00112-7 Vern Paxson. 1999. Bro: a system for detecting network intruders in real-time. Computer networks 31 (1999), 2435--2463. https:\/\/doi.org\/10.1016\/S1389-1286(99)00112-7"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.36"},{"key":"e_1_3_2_1_11_1","volume-title":"NSDI","volume":"10","author":"Perdisci Roberto","year":"2010","unstructured":"Roberto Perdisci , Wenke Lee , and Nick Feamster . 2010 . Behavioral clustering of http-based malware and signature generation using malicious network traces . In NSDI , Vol. 10 . USENIX Association, Berkeley, CA, United States, 14. https:\/\/dl.acm.org\/doi\/10.5555\/ 1855711.1855737 Roberto Perdisci, Wenke Lee, and Nick Feamster. 2010. Behavioral clustering of http-based malware and signature generation using malicious network traces. In NSDI, Vol. 10. USENIX Association, Berkeley, CA, United States, 14. https:\/\/dl.acm.org\/doi\/10.5555\/1855711.1855737"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00109"},{"key":"e_1_3_2_1_13_1","unstructured":"CTU University Praha Czech Republic. 2019. Malware Capture Facility Project. Retrieved 2019-12-18 from https:\/\/www.stratosphereips.org\/datasets-malware  CTU University Praha Czech Republic. 2019. Malware Capture Facility Project. Retrieved 2019-12-18 from https:\/\/www.stratosphereips.org\/datasets-malware"},{"volume-title":"The web application hacker's handbook: Finding and exploiting security flaws (2nd. ed.)","author":"Stuttard Dafydd","key":"e_1_3_2_1_14_1","unstructured":"Dafydd Stuttard and Marcus Pinto . 2011. The web application hacker's handbook: Finding and exploiting security flaws (2nd. ed.) . John Wiley & Sons , Indianapolis, IN . Dafydd Stuttard and Marcus Pinto. 2011. The web application hacker's handbook: Finding and exploiting security flaws (2nd. ed.). John Wiley & Sons, Indianapolis, IN."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1495"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON.2015.7443675"}],"event":{"name":"ICONETSI: International Conference on Engineering and Information Technology for Sustainable Industry","acronym":"ICONETSI","location":"Tangerang Indonesia"},"container-title":["Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429789.3429818","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3429789.3429818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:44Z","timestamp":1750195904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429789.3429818"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":16,"alternative-id":["10.1145\/3429789.3429818","10.1145\/3429789"],"URL":"https:\/\/doi.org\/10.1145\/3429789.3429818","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]}}}