{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T05:37:05Z","timestamp":1735882625359,"version":"3.32.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/pads.2005.29","type":"proceedings-article","created":{"date-parts":[[2005,7,28]],"date-time":"2005-07-28T01:00:20Z","timestamp":1122512420000},"page":"262-269","source":"Crossref","is-referenced-by-count":3,"title":["Simulation and Analysis on the Resiliency and Efficiency of Malnets"],"prefix":"10.1109","author":[{"family":"Jun Li","sequence":"first","affiliation":[]},{"given":"T.","family":"Ehrenkranz","sequence":"additional","affiliation":[]},{"given":"G.","family":"Kuenning","sequence":"additional","affiliation":[]},{"given":"P.","family":"Reiher","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Nimda, Code Red still crawling, threatening the Net","year":"2002","author":"costello","key":"ref10"},{"key":"ref11","article-title":"Midgard worms: Sudden nasty surprises from a large resilient zombie army","author":"reiher","year":"2004","journal-title":"UCLA Computer Science Department Tech Rep UCLA-CSD-TR080025"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(00)00118-6"},{"article-title":"Char-acterizing today's Gnutella topology","year":"2004","author":"stutzbach","key":"ref13"},{"key":"ref14","article-title":"Epidemics in small-world communication networks","author":"comellas","year":"2002","journal-title":"Tech Rep SFU-CMPT-TR 2002–09"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-003-0088-1"},{"article-title":"Scattercast: An architecture for Internet broadcast distribution as an infrastructure service","year":"2000","author":"chawathe","key":"ref16"},{"key":"ref17","first-page":"1","article-title":"A case for end system multicast","author":"chu","year":"2000","journal-title":"Measurement and Modeling of Comouter Systems"},{"article-title":"YOID: Your own Internet distribution","year":"2000","author":"francis","key":"ref18"},{"key":"ref19","first-page":"197","article-title":"Overcast: Reliable multicasting with an overlay network","author":"jannotti","year":"2000","journal-title":"Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI)"},{"key":"ref4","article-title":"BotNets: Detection and mitigation","author":"jones","year":"2003","journal-title":"Federal Computer Incident Response Center Tech Rep FCIRC"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1088\/0256-307X\/18\/3\/348","article-title":"Distance distribution and reliability of small-world networks","volume":"18","author":"sun","year":"2001","journal-title":"Chinese Physics Letter"},{"key":"ref3","article-title":"RFC 2810: Internet Relay Chat: Architecture","author":"kalt","year":"2000","journal-title":"RFC 2810 IETF"},{"key":"ref6","article-title":"How to Own the Internet in your spare time","author":"staniford","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium (Security '02)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"year":"0","key":"ref8","article-title":"WASTE: Anonymous, secure, encrypted sharing"},{"year":"2000","key":"ref7","article-title":"Know your enemy: Tracking botnets"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.26"},{"key":"ref9","article-title":"Netbait: A distributed worm detection service","author":"chun","year":"2003","journal-title":"Intel Research Berkeley Tech Rep IRB- TR-03–033"},{"year":"0","key":"ref1","article-title":"Distributed denial of service tools"},{"key":"ref20","first-page":"49","article-title":"ALMI: An application level multicast infrastructure","author":"pendarakis","year":"2001","journal-title":"Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS '01)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945473"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/378344.378347"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","article-title":"On random graphs. I","volume":"6","author":"erd\u00f6s","year":"1959","journal-title":"Publicationes Mathematicae Debrecen"},{"key":"ref23","article-title":"Resilient self-organizing overlay networks for security update delivery","author":"li","year":"2003","journal-title":"IEEE Journal on Selected Areas in Communications special issue on Service Ouerlay Networks"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/49.12889"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"barab\u00e1si","year":"1999","journal-title":"Science"}],"event":{"name":"Workshop on Principles of Advanced and Distributed Simulation (PADS'05)","location":"Monterey, CA, USA"},"container-title":["Workshop on Principles of Advanced and Distributed Simulation (PADS'05)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9855\/31040\/01443332.pdf?arnumber=1443332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T19:05:02Z","timestamp":1735844702000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1443332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/pads.2005.29","relation":{},"subject":[]}}