{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:50:42Z","timestamp":1763499042982,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"BMBF","award":["16KIS0975K","16KIS0976"],"award-info":[{"award-number":["16KIS0975K","16KIS0976"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485352","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"2432-2434","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CyberBunker 2.0 - A Domain and Traffic Perspective on a Bulletproof Hoster"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Kopp","sequence":"first","affiliation":[{"name":"DE-CIX, Frankfurt, Germany"}]},{"given":"Eric","family":"Strehle","sequence":"additional","affiliation":[{"name":"Brandenburg University of Technology, Cottbus, Germany"}]},{"given":"Oliver","family":"Hohlfeld","sequence":"additional","affiliation":[{"name":"Brandenburg University of Technology, Cottbus, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Alrwais et al. 2017. Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks. In IEEE S&P.","DOI":"10.1109\/SP.2017.32"},{"key":"e_1_3_2_2_2_1","unstructured":"CyberBunker.com. 2016. Stay Online Policy . https:\/\/web.archive.org\/web\/20160928055012mp_\/http:\/\/www.cyberbunker.com\/web\/stay-online-policy.php"},{"key":"e_1_3_2_2_3_1","unstructured":"Max Goncharov. 2015. Criminal hideouts for lease: Bulletproof hosting services. (2015). https:\/\/web.archive.org\/web\/20170314195218\/http:\/\/housecall.trendmicro.com\/media\/wp\/wp-criminal-hideouts-for-lease-en.pdf"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Oliver Hohlfeld. 2018. Operating a DNS-based Active Internet Observatory. In ACM SIGCOMM Poster.","DOI":"10.1145\/3234200.3234239"},{"key":"e_1_3_2_2_5_1","unstructured":"Public Prosecution Office Koblenz. 2020. Indictment CyberBunker 2.0. web.archive.org\/web\/20200407111855\/https:\/\/gstko.justiz.rlp.de\/de\/startseite\/detail\/news\/News\/detail\/landeszentralstelle-cybercrime-der-generalstaatsanwaltschaft-koblenz-erhebt-anklage-gegen-acht-tatve\/"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Maria Konte Roberto Perdisci and Nick Feamster. 2015. ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes. In ACM SIGCOMM.","DOI":"10.1145\/2785956.2787494"},{"key":"e_1_3_2_2_7_1","unstructured":"Karim Lalji. 2021. Real-Time Honeypot Forensic Investigation on a German Organized Crime Network. https:\/\/sansorg.egnyte.com\/dl\/rgbB6BYE6z\/"},{"key":"e_1_3_2_2_8_1","unstructured":"RIPE NCC. 2021. Routing Information Service Raw Data. https:\/\/www.ripe.net\/analyse\/internet-measurements\/routing-information-service-ris\/ris-raw-data"},{"key":"e_1_3_2_2_9_1","unstructured":"Arman Noroozian et al. 2019. Platforms in everything: analyzing ground-truth data on the anatomy and economics of bullet-proof hosting."},{"key":"e_1_3_2_2_10_1","unstructured":"OpenDNS.com. 2021. Domain Tagging. https:\/\/community.opendns.com\/domaintagging\/categories"},{"key":"e_1_3_2_2_11_1","unstructured":"The Register. 2019. 600 armed German cops storm Cyberbunker. https:\/\/www.theregister.com\/2019\/09\/30\/cyberbunker_cb3rob_germany_police_raid\/"},{"key":"e_1_3_2_2_12_1","unstructured":"Spamhaus.org. 2021. ZYZTM Research Division. https:\/\/www.spamhaus.org\/rokso\/sbl_archived\/SPM1338\/zyztm-research-division"},{"key":"e_1_3_2_2_13_1","unstructured":"Raphael Vinot and Alexandre Dulaunoy. 2010. BGP Ranking. https:\/\/github.com\/D4-project\/bgp-ranking\/"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485352","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:47:10Z","timestamp":1763498830000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485352"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":13,"alternative-id":["10.1145\/3460120.3485352","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485352","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}