{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T21:58:36Z","timestamp":1772575116302,"version":"3.50.1"},"reference-count":44,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1016\/j.comnet.2012.07.016","type":"journal-article","created":{"date-parts":[[2012,8,30]],"date-time":"2012-08-30T04:15:30Z","timestamp":1346300130000},"page":"540-555","source":"Crossref","is-referenced-by-count":23,"title":["Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks"],"prefix":"10.1016","volume":"57","author":[{"given":"Guanhua","family":"Yan","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2012.07.016_b0005","unstructured":"D. Ashley, An algorithm for http bot detection. <https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/security.utexas.edu\/consensus\/HTTP%20Bot%20Detection.pdf>."},{"key":"10.1016\/j.comnet.2012.07.016_b0010","series-title":"Malware Detection","article-title":"An inside look at botnets","volume":"vol. 27","author":"Barford","year":"2006"},{"key":"10.1016\/j.comnet.2012.07.016_b0015","doi-asserted-by":"crossref","unstructured":"L. Bilge, T. Strufe, D. Balzarotti, E. Kirda, All your contacts are belong to us: automated identity theft attacks on social networks, in: Proceedings of ACM WWW\u201909, 2009.","DOI":"10.1145\/1526709.1526784"},{"issue":"2","key":"10.1016\/j.comnet.2012.07.016_b0020","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1080\/0022250X.2001.9990249","article-title":"A faster algorithm for betweenness centrality","volume":"25","author":"Brandes","year":"2001","journal-title":"Journal of Mathematical Sociology"},{"key":"10.1016\/j.comnet.2012.07.016_b0025","unstructured":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/brightkite.com."},{"key":"10.1016\/j.comnet.2012.07.016_b0030","unstructured":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/techcrunch.com\/2010\/02\/26\/brightkite-2-million-users\/."},{"key":"10.1016\/j.comnet.2012.07.016_b0035","unstructured":"Z. Cai, C. Jermaine, The latent community model for detecting Sybils in social networks, in: Proceedings of the 19th Annual Network & Distributed System Security Symposium, February 2012."},{"key":"10.1016\/j.comnet.2012.07.016_b0040","unstructured":"E. Cooke, F. Jahanian, D. McPherson, The zombie roundup: understanding, detecting, and disrupting botnets, in: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop, USENIX Association, 2005, pp. 6."},{"key":"10.1016\/j.comnet.2012.07.016_b0045","unstructured":"G. Danezis, P. Mittal, Sybilinfer: detecting sybil nodes using social networks, in: Proceedings of NDSS\u201909, 2009."},{"key":"10.1016\/j.comnet.2012.07.016_b0050","unstructured":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.facebook.com\/press\/info.php?statistics."},{"key":"10.1016\/j.comnet.2012.07.016_b0055","doi-asserted-by":"crossref","unstructured":"S. Ghosh, B. Viswanath, F. Kooti, N.K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, K.P. Gummadi, Understanding and combating link farming in the twitter social network, in: Proceedings of the 21st International Conference on World Wide Web, WWW\u201912, 2012, pp. 61\u201370.","DOI":"10.1145\/2187836.2187846"},{"key":"10.1016\/j.comnet.2012.07.016_b0060","unstructured":"J. Goebel, T. Holz, Rishi: identify bot contaminated hosts by irc nickname evaluation, in: Proceedings of UNENIX HotBots\u201907, 2007."},{"key":"10.1016\/j.comnet.2012.07.016_b0065","doi-asserted-by":"crossref","unstructured":"C. Grier, K. Thomas, V. Paxson, M. Zhang, @spam: the underground on 140 characters or less, in: Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010.","DOI":"10.1145\/1866307.1866311"},{"key":"10.1016\/j.comnet.2012.07.016_b0070","unstructured":"G. Gu, R. Perdisci, J. Zhang, W. Lee, Botminer: clustering analysis of network traffic for protocol- and structure-independent botnet detection, in: Proceedings of the 17th Conference on Security Symposium, 2008."},{"key":"10.1016\/j.comnet.2012.07.016_b0075","unstructured":"G. Gu, P. Porras, V. Yegneswaran, M. Fong, W. Lee, Bothunter: detecting malware infection through ids-driven dialog correlation, in: Proceedings of 16th USENIX Security Symposium, 2007."},{"key":"10.1016\/j.comnet.2012.07.016_b0080","unstructured":"G. Gu, J. Zhang, W. Lee, BotSniffer: detecting botnet command and control channels in network traffic, in: Proceedings of NDSS\u201908, The Internet Society, February 2008."},{"key":"10.1016\/j.comnet.2012.07.016_b0085","unstructured":"T. Holz, M. Steiner, F. Dahl, E. Biersack, F. Freiling, Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm, in: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, USENIX Association, 2008, pp. 9:1\u20139:9."},{"key":"10.1016\/j.comnet.2012.07.016_b0090","unstructured":"A. Karasaridis, B. Rexroad, D. Hoeflin, Wide-scale botnet detection and characterization, in: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, USENIX Association, pp. 7\u20137, 2007."},{"key":"10.1016\/j.comnet.2012.07.016_b0095","doi-asserted-by":"crossref","unstructured":"H. Kwak, C. Lee, H. Park, S. Moon, What is twitter, a social network or a news media? in: Proceedings of ACM WWW\u201910, 2010.","DOI":"10.1145\/1772690.1772751"},{"key":"10.1016\/j.comnet.2012.07.016_b0100","doi-asserted-by":"crossref","unstructured":"J.-S. Lee, H. Jeong, J.-H. Park, M. Kim, B.-N. Noh, The activity analysis of malicious http-based botnets using degree of periodic repeatability, in: Proceedings of the 2008 International Conference on Security Technology, 2008.","DOI":"10.1109\/SecTech.2008.52"},{"key":"10.1016\/j.comnet.2012.07.016_b0105","series-title":"Proceedings of the 11th International Conference on Information Security","first-page":"97","article-title":"Bottracer: execution-based bot-like malware detection","author":"Liu","year":"2008"},{"key":"10.1016\/j.comnet.2012.07.016_b0110","doi-asserted-by":"crossref","unstructured":"A. Mohaisen, N. Hopper, Y. Kim, Keep your friends close: incorporating trust into social network-based sybil defenses, in: Proceedings of IEEE Infocom\u201911, 2011.","DOI":"10.1109\/INFCOM.2011.5934998"},{"key":"10.1016\/j.comnet.2012.07.016_b0115","doi-asserted-by":"crossref","unstructured":"S. Nagaraja, A. Houmansadr, P. Piyawongwisal, V. Singh, P. Agarwal, N. Borisov, Stegobot: a covert social network botnet, in: Proceedings of the 13th International Conference on Information Hiding, IH\u201911, 2011.","DOI":"10.1007\/978-3-642-24178-9_21"},{"key":"10.1016\/j.comnet.2012.07.016_b0120","unstructured":"S. Nagaraja, P. Mittal, C.-Y. Hong, M. Caesar, N. Borisov, Botgrep: finding p2p bots with structured graph analysis, in: Proceedings of USENIX Security\u201910, Washington, DC, 2010."},{"key":"10.1016\/j.comnet.2012.07.016_b0125","doi-asserted-by":"crossref","unstructured":"N.P. Nguyen, G. Yan, M.T. Thai, S. Eidenbenz, Containment of misinformation spread in online social networks, in: Proceedings of the 4th ACM Web Science (WebSci\u201912), 2012.","DOI":"10.1145\/2380718.2380746"},{"key":"10.1016\/j.comnet.2012.07.016_b0130","unstructured":"A. Ramachandran, N. Feamster, D. Dagon, Revealing botnet membership using dnsbl counter-intelligence, in: Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet, San Jose, CA, USENIX, 2006."},{"key":"10.1016\/j.comnet.2012.07.016_b0135","doi-asserted-by":"crossref","unstructured":"B. Stock, J. G\u00f6bel, M. Engelberth, F.C. Freiling, T. Holz, Walowdac \u2013 analysis of a peer-to-peer botnet, in: Computer Network Defense (EC2ND), 2009 European Conference, November 2009, pp. 13\u201320.","DOI":"10.1109\/EC2ND.2009.10"},{"key":"10.1016\/j.comnet.2012.07.016_b0140","series-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS \u201909","first-page":"635","article-title":"Your botnet is my botnet: analysis of a botnet takeover","author":"Stone-Gross","year":"2009"},{"key":"10.1016\/j.comnet.2012.07.016_b0145","unstructured":"K. Thomas, D.M. Nicol, The Koobface botnet and the rise of social malware, in: Proceedings of IEEE MALWARE\u201910."},{"key":"10.1016\/j.comnet.2012.07.016_b0150","unstructured":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.itpro.co.uk\/623323\/twitter-botnet-creation-made-simple."},{"key":"10.1016\/j.comnet.2012.07.016_b0155","unstructured":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.wired.com\/threatlevel\/2009\/08\/botnet-tweets\/."},{"key":"10.1016\/j.comnet.2012.07.016_b0160","unstructured":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.tgdaily.com\/software-brief\/52284-twitter-on-pace-to-reach200-million-users-by-2011."},{"key":"10.1016\/j.comnet.2012.07.016_b0165","doi-asserted-by":"crossref","unstructured":"B. Viswanath, A. Post, K.P. Gummadi, A. Mislove, An analysis of social network-based sybil defenses, in: Proceedings of the ACM SIGCOMM\u201910, 2010.","DOI":"10.1145\/1851182.1851226"},{"key":"10.1016\/j.comnet.2012.07.016_b0170","doi-asserted-by":"crossref","unstructured":"W. Wei, F. Xu, C.C. Tan, Qun Li, Sybildefender: defend against sybil attacks in large social networks, in: Proceedings of IEEE Infocom\u201912, 2012.","DOI":"10.1109\/INFCOM.2012.6195572"},{"key":"10.1016\/j.comnet.2012.07.016_b0175","doi-asserted-by":"crossref","unstructured":"Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, I. Osipkov, Spamming botnets: signatures and characteristics, in: Proceedings of SIGCOMM\u201908, 2008.","DOI":"10.1145\/1402958.1402979"},{"key":"10.1016\/j.comnet.2012.07.016_b0180","doi-asserted-by":"crossref","unstructured":"G. Yan, G. Chen, S. Eidenbenz, N. Li, Malware propagation in online social networks: nature, dynamics, and defense implications, in: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS \u201911, 2011, pp. 196\u2013206.","DOI":"10.1145\/1966913.1966939"},{"key":"10.1016\/j.comnet.2012.07.016_b0185","doi-asserted-by":"crossref","unstructured":"C. Yang, R. Harkreader, J. Zhang, S. Shin, G. Gu, Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on twitter, in: Proceedings of the 21st International Conference on World Wide Web, WWW \u201912, 2012, pp. 71\u201380.","DOI":"10.1145\/2187836.2187847"},{"key":"10.1016\/j.comnet.2012.07.016_b0190","doi-asserted-by":"crossref","unstructured":"Z. Yang, C. Wilson, X. Wang, T. Gao, B.Y. Zhao, Y. Dai, Uncovering social network sybils in the wild, in: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC \u201911, 2011, pp. 259\u2013268.","DOI":"10.1145\/2068816.2068841"},{"key":"10.1016\/j.comnet.2012.07.016_b0195","doi-asserted-by":"crossref","unstructured":"T.-F. Yen, M.K. Reiter, Traffic aggregation for malware detection, in: Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2008.","DOI":"10.1007\/978-3-540-70542-0_11"},{"issue":"3","key":"10.1016\/j.comnet.2012.07.016_b0200","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/2034575.2034593","article-title":"Sybil defenses via social networks: a tutorial and survey","volume":"42","author":"Yu","year":"2011","journal-title":"SIGACT News"},{"key":"10.1016\/j.comnet.2012.07.016_b0205","doi-asserted-by":"crossref","unstructured":"H. Yu, P.B. Gibbons, M. Kaminsky, F. Xiao, Sybillimit: a near-optimal social network defense against sybil attacks, in: Proceedings of the 2008 IEEE Symposium on Security and Privacy, 2008.","DOI":"10.1109\/SP.2008.13"},{"issue":"4","key":"10.1016\/j.comnet.2012.07.016_b0210","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1145\/1151659.1159945","article-title":"Sybilguard: defending against sybil attacks via social networks","volume":"36","author":"Yu","year":"2006","journal-title":"SIGCOMM Computing Communication Review"},{"key":"10.1016\/j.comnet.2012.07.016_b0215","series-title":"Proceedings of the Nineteenth International Workshop on Quality of Service, IWQoS \u201911","first-page":"1:1","article-title":"Measuring the effectiveness of infrastructure-level detection of large-scale botnets","author":"Zeng","year":"2011"},{"key":"10.1016\/j.comnet.2012.07.016_b0220","unstructured":"Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, E. Gillum, Botgraph: large scale spamming botnet detection, in: Proceedings of USENIX NSDI\u201909, 2009."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1389128612002903?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1389128612002903?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T06:35:14Z","timestamp":1562135714000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128612002903"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,2]]}},"alternative-id":["S1389128612002903"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.comnet.2012.07.016","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2013,2]]}}}