{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:34Z","timestamp":1750220314760,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T00:00:00Z","timestamp":1620345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,7]]},"DOI":"10.1145\/3478472.3478481","type":"proceedings-article","created":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T02:03:25Z","timestamp":1634436205000},"page":"47-56","source":"Crossref","is-referenced-by-count":1,"title":["Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program Identification"],"prefix":"10.1145","author":[{"given":"Yong","family":"Jin","sequence":"first","affiliation":[{"name":"Tokyo Institute of Technology, Japan"}]},{"given":"Masahiko","family":"Tomoishi","sequence":"additional","affiliation":[{"name":"Tokyo Institute of Technology, Japan"}]},{"given":"Nariyoshi","family":"Yamai","sequence":"additional","affiliation":[{"name":"Tokyo University of Agriculture and Technology, Japan"}]}],"member":"320","published-online":{"date-parts":[[2021,10,15]]},"reference":[{"volume-title":"ISTR: Internet Security Threat Report","year":"2019","author":"Symantec Corporation","key":"e_1_3_2_1_1_1"},{"volume-title":"morto\u2019 worm infects windows systems with weak passwords","year":"2021","author":"Rashid F.Y.","key":"e_1_3_2_1_2_1"},{"volume-title":"Feederbot botnet using dns as carrier for command and control (c2)","year":"2021","author":"Dietrich C.J.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2017ICP0014"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2017ITP0009"},{"volume-title":"RFC Editor","year":"2006","author":"Stapp B.V. M.","key":"e_1_3_2_1_6_1"},{"volume-title":"RFC Editor","year":"1987","author":"Mockapetris P.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2018.00070"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2017.8190948"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.53"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.037"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.045"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.032"},{"volume-title":"Future Generation Computer Systems","year":"2018","author":"Viegas E.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529734"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.07.018"},{"volume-title":"RFC Editor","year":"2010","author":"Levine J.","key":"e_1_3_2_1_17_1"},{"volume-title":"Dns sinkhole","year":"2021","author":"Bruneau G.","key":"e_1_3_2_1_18_1"},{"volume-title":"Fast flux networks: What are they and how do they work?","year":"2017","author":"Albors J.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","first-page":"24","volume-title":"Proceedings of the 21st USENIX Conference on Security Symposium, Security\u201912","author":"Antonakakis M.","year":"2012"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2013.6755060"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883426"},{"volume-title":"Open Networking Foundation: SDN Architecture","year":"2014","key":"e_1_3_2_1_23_1"},{"volume-title":"VirtualBox","year":"2021","key":"e_1_3_2_1_24_1"},{"volume-title":"Cygwin: Get that Linux Feeling - on Windows","year":"2021","key":"e_1_3_2_1_25_1"},{"volume-title":"Windivert 1.4: Windows packet divert","year":"2021","key":"e_1_3_2_1_26_1"},{"volume-title":"POX Manual","year":"2021","key":"e_1_3_2_1_27_1"},{"volume-title":"Net::DNS::Dynamic::Proxyserver - A dynamic DNS proxy-server","year":"2021","key":"e_1_3_2_1_28_1"},{"volume-title":"BIND 9, Versatile, classic, complete name server software","year":"2021","author":"Internet Systems Consortium","key":"e_1_3_2_1_29_1"},{"volume-title":"Response Policy Zones (RPZ)","year":"2021","author":"Internet Systems Consortium","key":"e_1_3_2_1_30_1"},{"volume-title":"Google public dns","year":"2021","author":"Google","key":"e_1_3_2_1_31_1"},{"volume-title":"GNU Wget","year":"2021","key":"e_1_3_2_1_32_1"},{"volume-title":"Command line tool and library for transferring data with urls","year":"2021","key":"e_1_3_2_1_33_1"}],"event":{"name":"ICHMI 2021: 2021 International Conference on Human-Machine Interaction","acronym":"ICHMI 2021","location":"Guangzhou China"},"container-title":["2021 International Conference on Human-Machine Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3478472.3478481","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3478472.3478481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:48Z","timestamp":1750191108000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3478472.3478481"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,7]]},"references-count":33,"alternative-id":["10.1145\/3478472.3478481","10.1145\/3478472"],"URL":"https:\/\/doi.org\/10.1145\/3478472.3478481","relation":{},"subject":[],"published":{"date-parts":[[2021,5,7]]}}}