{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:51:27Z","timestamp":1730321487084,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T00:00:00Z","timestamp":1569283200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MIST\/IITP"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,24]]},"DOI":"10.1145\/3338840.3355672","type":"proceedings-article","created":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T21:49:16Z","timestamp":1573595356000},"page":"283-288","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["DGA-based malware detection using DNS traffic analysis"],"prefix":"10.1145","author":[{"given":"Jong Youn","family":"Lee","sequence":"first","affiliation":[{"name":"Hanyang University, Seoul, Korea"}]},{"given":"Jun Young","family":"Chang","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, Korea"}]},{"given":"Eul Gyu","family":"Im","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, Korea"}]}],"member":"320","published-online":{"date-parts":[[2019,9,24]]},"reference":[{"volume-title":"Proceedings of the USENIX security symposium. USENIX Association Berkeley","year":"2010","author":"Antonakakis Manos","key":"e_1_3_2_1_1_1"},{"volume-title":"Proceedings of the 21st {USENIX} Security Symposium ({USENIX} Security 12)","year":"2012","author":"Antonakakis Manos","key":"e_1_3_2_1_2_1"},{"volume-title":"https:\/\/www.av-test.org\/en\/statistics\/malware\/","year":"2019","author":"Malware AV-TEST.","key":"e_1_3_2_1_3_1"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium. ISOC","year":"2011","author":"Bilge Leyla","key":"e_1_3_2_1_4_1"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium. ISOC","year":"2009","author":"Dagon David","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","first-page":"6","article-title":"On the Potential of Proactive Domain Blacklisting","volume":"10","author":"Felegyhazi Mark","year":"2010","journal-title":"LEET"},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"Conficker.C A technical analysis","volume":"1","author":"Fitzgibbon Niall","year":"2009","journal-title":"Sophos Labs, Sophos Inc"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN.2015.7095337"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140486"},{"key":"e_1_3_2_1_10_1","unstructured":"Claudio Guarnieri Allessandro Tanasi Jurriaan Bremer and Mark Schloesser. 2012. The cuckoo sandbox. (2012). Claudio Guarnieri Allessandro Tanasi Jurriaan Bremer and Mark Schloesser. 2012. The cuckoo sandbox. (2012)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2513228.2513294"},{"volume-title":"Proceedings of the International Conference on IT Convergence and Security 120","year":"2011","author":"Han Kyoung Soo","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0242-0"},{"key":"e_1_3_2_1_14_1","first-page":"521","article-title":"Existent domain name DNS traffic capture and analysis. (Aug. 27 2013)","volume":"8","author":"Holmes Alexander D","year":"2013","journal-title":"US Patent"},{"volume-title":"https:\/\/software.intel.com\/sites\/landingpage\/pintool\/docs\/97619\/Pin\/html\/index.html","year":"2018","author":"User Guide Pin","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"Security News KyeongAe Kim. 2017. DNS attack how far has it evolved. (2017). https:\/\/www.boannews.com\/media\/view.asp?idx=57246 Security News KyeongAe Kim. 2017. DNS attack how far has it evolved. (2017). https:\/\/www.boannews.com\/media\/view.asp?idx=57246"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488056"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.04.001"},{"key":"e_1_3_2_1_19_1","unstructured":"M Namazifar and Y Pan. 2015. Research spotlight: detecting algorithmically generated domains. (2015). M Namazifar and Y Pan. 2015. Research spotlight: detecting algorithmically generated domains. (2015)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690854"},{"key":"e_1_3_2_1_21_1","first-page":"1","article-title":"Conficker C analysis","volume":"1","author":"Porras Phillip","year":"2009","journal-title":"SRI International"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2579359"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/IHMSC.2016.53"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879148"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489147"},{"volume-title":"Eul Gyu Im, and Hoh Peter In.","year":"2004","author":"Yun Joo Beom","key":"e_1_3_2_1_26_1"}],"event":{"name":"RACS '19: International Conference on Research in Adaptive and Convergent Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Chongqing China","acronym":"RACS '19"},"container-title":["Proceedings of the Conference on Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338840.3355672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T10:55:01Z","timestamp":1673434501000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338840.3355672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,24]]},"references-count":26,"alternative-id":["10.1145\/3338840.3355672","10.1145\/3338840"],"URL":"https:\/\/doi.org\/10.1145\/3338840.3355672","relation":{},"subject":[],"published":{"date-parts":[[2019,9,24]]},"assertion":[{"value":"2019-09-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}