{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:14:55Z","timestamp":1743113695190,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642330179"},{"type":"electronic","value":"9783642330186"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-33018-6_10","type":"book-chapter","created":{"date-parts":[[2012,8,23]],"date-time":"2012-08-23T09:14:19Z","timestamp":1345713259000},"page":"97-108","source":"Crossref","is-referenced-by-count":0,"title":["C&C Techniques in Botnet Development"],"prefix":"10.1007","author":[{"given":"F\u00e9lix","family":"Brezo","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Gaviria","family":"de la Puerta","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Santos","sequence":"additional","affiliation":[]},{"given":"David","family":"Barroso","sequence":"additional","affiliation":[]},{"given":"Pablo Garcia","family":"Bringas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Lillington, K.: Time to talk: Anonymus speaks outs"},{"key":"10_CR2","unstructured":"InfoSecurity: Anonymus hacking group uses IRC channles to co-ordinate DDoS attacks (2011)"},{"key":"10_CR3","unstructured":"Office, F.N.P.: Over 1 Million Potential Victims of Botnet Cyber Crime (2007)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Corrons, L.: Mariposa botnet (2010)","DOI":"10.1016\/S1353-4858(10)70036-2"},{"key":"10_CR5","unstructured":"NATO\/OTAN: Tackling new security challenges. Technical report (2011)"},{"key":"10_CR6","unstructured":"Lemos, R.: U. S. military to build botnets?\u00a0737 (2008)"},{"key":"10_CR7","unstructured":"Williamson, C.W.: Carpet bombing in cyberspace: Why America needs a military botnet"},{"key":"10_CR8","unstructured":"Trust, E.T.E.: Desactivando redes de ordenadores controlados por ciberdelincuentes para crear un internet ms seguroy fiable (2010)"},{"key":"10_CR9","unstructured":"Studer, R.: Economic and Technical Analysis of BotNets and Denial-of-Service Attacks. In: Communication Systems IV. University of Zurich, Department of Informatics (2011)"},{"issue":"5","key":"10_CR10","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/S1361-3723(10)70055-5","volume":"2010","author":"D. Bleaken","year":"2010","unstructured":"Bleaken, D.: Botwars: the fight against criminal cyber networks. Computer Fraud & Security\u00a02010(5), 17\u201319 (2010)","journal-title":"Computer Fraud & Security"},{"issue":"1","key":"10_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJEMR.2011.039893","volume":"4","author":"K. Smith","year":"2011","unstructured":"Smith, K., Lin, P.: Keeping internet marketing up and running: potential disasters and how to plan for them. International Journal of Electronic Marketing and Retailing\u00a04(1), 1\u201315 (2011)","journal-title":"International Journal of Electronic Marketing and Retailing"},{"key":"10_CR12","unstructured":"Cranton, T.: Cracking Down on Botnets (2010)"},{"key":"10_CR13","unstructured":"Seiiler, J.: Entrance of Wikileaks Into Fourth Estate Creates Perils, Opportunities"},{"key":"10_CR14","unstructured":"Bloxham, A., Swinford, S.: WikiLeaks cyberwar: hackers planning revenge attack on Amazon."},{"key":"10_CR15","volume-title":"Reihe Informatik","author":"J. Zhuge","year":"2007","unstructured":"Zhuge, J., Holz, T., Han, X., Guo, J., Zou, W.: Characterizing the irc-based botnet phenomenon. In: Reihe Informatik. Pace University, White Plains (2007)"},{"key":"10_CR16","unstructured":"Grizzard, J., Sharma, V., Nunnery, C., Kang, B., Dagon, D.: Peer-to-peer botnets: Overview and case study. In: Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets (2007)"},{"key":"10_CR17","unstructured":"Wang, P., Wu, L., Aslam, B., Zou, C.: An advanced hybrid peer-to-peer botnet. In: USENIX Workshop on Hot Topics in Understanding Botnets (HotBots 2007) (2007)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Wang, P., Wu, L., Aslam, B.: C.\u00a0Zou, C.: A systematic study on peer-to-peer botnets. In: Proceedings of 18th Internatonal Conference on Computer Communications and Networks, ICCCN 2009 (2009)","DOI":"10.1109\/ICCCN.2009.5235360"},{"key":"10_CR19","unstructured":"Naoumov, N., Ross, K.: Exploiting p2p systems for ddos attacks (2009)"},{"key":"10_CR20","unstructured":"Nagaraja, S., Mittal, P., Hong, C.Y., Caesar, M., Borisov, N.: Botgrep: Finding p2p bots with structured graph analysis (2010)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Binsalleeh, H., Ormerod, T., Boukhtouta, A., Sinha, P., Youssef, A., Debbabi, M., Wang, L.: On the analysis of the zeus botnet crimeware toolkit. In: Eighth Annual International Conference on Privacy Security and Trust, PST (2010)","DOI":"10.1109\/PST.2010.5593240"},{"key":"10_CR22","unstructured":"Seltzer, L.: Zeus Source Code Released"},{"key":"10_CR23","unstructured":"Ragan, S.: Overview: Inside the Zeus Trojans source code"},{"key":"10_CR24","unstructured":"Calles, J.A., Gonz\u00e0lez, P.: Troyano Flu b0.4 Windows. Manual de Usuario (2011)"},{"key":"10_CR25","unstructured":"Nazario, J.: Twitter-based Botnet Command Channel (2009)"},{"key":"10_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/978-3-642-13708-2_30","volume-title":"Applied Cryptography and Network Security","author":"E. Kartaltepe","year":"2010","unstructured":"Kartaltepe, E., Morales, J., Xu, S., Sandhu, R.: Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol.\u00a06123, pp. 511\u2013528. Springer, Heidelberg (2010)"},{"issue":"2","key":"10_CR27","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MSECP.2003.1193207","volume":"1","author":"L. Spitzner","year":"2003","unstructured":"Spitzner, L.: The honeynet project: Trapping the hackers. IEEE Security & Privacy\u00a01(2), 15\u201323 (2003)","journal-title":"IEEE Security & Privacy"},{"issue":"2","key":"10_CR28","doi-asserted-by":"publisher","first-page":"1250005","DOI":"10.1142\/S0129065712500050","volume":"22","author":"L. Herrero","year":"2012","unstructured":"Herrero, L., Zurutuza, U., Corchado, E.: A neural-visualization ids for honeynet data. International Journal of Neural Systems\u00a022(2), 1250005 (2012)","journal-title":"International Journal of Neural Systems"},{"issue":"2","key":"10_CR29","doi-asserted-by":"publisher","first-page":"2042","DOI":"10.1016\/j.asoc.2010.07.002","volume":"11","author":"E. Corchado","year":"2011","unstructured":"Corchado, E., Herrero, \u00c1.: Neural visualization of network traffic data for intrusion detection. Applied Soft Computing\u00a011(2), 2042\u20132056 (2011)","journal-title":"Applied Soft Computing"},{"key":"10_CR30","volume-title":"Student-Faculty Research Day, CSIS","author":"J. Massi","year":"2010","unstructured":"Massi, J., Panda, S., Rajappa, G., Selvaraj, S., Swapana, R.: Botnet detection and mitigation. In: Student-Faculty Research Day, CSIS. Pace University, White Plains (2010)"},{"key":"10_CR31","unstructured":"Goebel, J., Holz, T.: Rishi: Identify bot contaminated hosts by irc nickname evaluation. In: Proceedings of the USENIX Workshop on Hot Topics in Understanding Botnets, HotBots (2007)"},{"issue":"4","key":"10_CR32","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/1402946.1402979","volume":"38","author":"Y. Xie","year":"2008","unstructured":"Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: Signatures and characteristics. ACM SIGCOMM Computer Communication Review\u00a038(4), 171\u2013182 (2008)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Ormerod, T., Wang, L., Debbabi, M., Youssef, A., Binsalleeh, H., Boukhtouta, A., Sinh, P.: Defaming botnet toolkits: A bottom-up approach to mitigating the threat. In: eCrime Researchers Summit, eCrime (2010)","DOI":"10.1109\/SECURWARE.2010.39"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Riccardi, M., Oro, D., Luna, J., Cremonini, M., Vilanova, M.: A framework for financial botnet analysis. In: eCrime Researchers Summit, eCrime (2010)","DOI":"10.1109\/ecrime.2010.5706697"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Liang, J., Naoumov, N., Ross, K.: The index poisoning attack in p2p file sharing systems. In: IEEE INFOCOM, Citeseer, vol.\u00a06 (2006)","DOI":"10.1109\/INFOCOM.2006.232"},{"key":"10_CR36","unstructured":"Lou, X., Hwang, K.: Prevention of index-poisoning DDoS attacks in peer-to-peer file-sharing networks. Submitted to IEEE Trans. on Multimedia, Special Issue on Content Storage and Delivery in P2P Networks (2006)"},{"key":"10_CR37","unstructured":"Staniford, S., Parxson, V., Weaver, N.: How to own the internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium (2002)"},{"key":"10_CR38","unstructured":"Vogt, R., Aycock, J., Jacobson, M.: Army of botnets. In: Proceedings of the 2007 Network and Distr. System Sec. Symposium (NDSS 2007), Citeseer, pp. 111\u2013123 (2007)"},{"key":"10_CR39","unstructured":"Karge, S.: The german anti-botnet initiative. In: OECD Workshop: The Role of Internet Intermediaries in Advancing Public Policy Objectives, Organization for Economic Co-Operation and Development (2011)"},{"key":"10_CR40","unstructured":"Ashford, W.: Collaborative strike takes down second hlux\/kelihos botnet (2012)"},{"key":"10_CR41","unstructured":"Gostev, A.: Kaspersky Security Bulletin. Malware Evolution 2010. Technical report, Karspersky Labs (February 2011)"},{"key":"10_CR42","unstructured":"Kok, J., Kurz, B.: Analysis of the botnet ecosystem. In: 10th Conference of Telecommunication, Media and Internet Techno-Economics (CTTE). VDE, pp. 1\u201310 (2011)"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference CISIS\u201912-ICEUTE\u00b412-SOCO\u00b412 Special Sessions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33018-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,12]],"date-time":"2023-02-12T01:23:25Z","timestamp":1676165005000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33018-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642330179","9783642330186"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33018-6_10","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}