{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:35:26Z","timestamp":1725507326238},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/glocom.2008.ecp.414","type":"proceedings-article","created":{"date-parts":[[2010,12,8]],"date-time":"2010-12-08T09:51:12Z","timestamp":1291801872000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["CRESTBOT: A New Family of Resilient Botnets"],"prefix":"10.1109","author":[{"given":"Duc T.","family":"Ha","sequence":"first","affiliation":[]},{"given":"Hung Q.","family":"Ngo","sequence":"additional","affiliation":[]},{"given":"Madhusudhanan","family":"Chandrasekaran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"39","article-title":"the zombie roundup: understanding, detecting, and disrupting botnetns","author":"cooke","year":"2005","journal-title":"Workshop on Steps to Reducing Unwanted Trafficon theInternet (SRUTI)"},{"key":"16","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1109\/MASCOT.2001.948886","article-title":"brite: an approach to universal topology generation","author":"medina","year":"2001","journal-title":"Modeling Analysis and Simulation of Computer and Telecommunication Systems 2001 Proceedings Ninth International Symposium on"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/780542.780630"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/INFCOM.2000.832574"},{"key":"11","first-page":"167","author":"gu","year":"0","journal-title":"Bothunter Detecting malware infection through ids-driven dialog correlation"},{"year":"0","key":"12"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/TDSC.2008.35"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","article-title":"an algorithm for anomaly-based botnet detection","author":"binkley","year":"2006","journal-title":"SRUTI'06 Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the"},{"key":"7","first-page":"41","article-title":"a multifaceted approach to understanding the botnet phenomenon","author":"rajab","year":"2006","journal-title":"Internet Measurement Conference"},{"key":"6","article-title":"botnet tracking: exploring a root- cause methodology to prevent distributed denial-of-service attacks","author":"freiling","year":"2005","journal-title":"LNCS"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/1060289.1060313"},{"year":"0","key":"4"},{"key":"9","article-title":"my botnet is bigger than yours (maybe, better than yours)","author":"rajab","year":"2007","journal-title":"Proceedings 2007 USENIX First workshop on Hot Topics in Understanding Botnets"},{"key":"8","article-title":"modeling botnet propagation using time zones","author":"dagon","year":"2006","journal-title":"NDSS"}],"event":{"name":"IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference","start":{"date-parts":[[2008,11,30]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2008,12,4]]}},"container-title":["IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4697774\/4697775\/04698189.pdf?arnumber=4698189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T12:59:40Z","timestamp":1497877180000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4698189\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/glocom.2008.ecp.414","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}