EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection
Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While networ...
Ausführliche Beschreibung
Autor*in: |
Shin, Seungwon [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2013transfer abstract |
---|
Schlagwörter: |
---|
Umfang: |
15 |
---|
Übergeordnetes Werk: |
Enthalten in: Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls - Poo, J.L. ELSEVIER, 2016, the international journal of computer and telecommunications networking, Amsterdam [u.a.] |
---|---|
Übergeordnetes Werk: |
volume:57 ; year:2013 ; number:13 ; day:9 ; month:09 ; pages:2628-2642 ; extent:15 |
Links: |
---|
DOI / URN: |
10.1016/j.comnet.2013.05.010 |
---|
Katalog-ID: |
ELV038542935 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV038542935 | ||
003 | DE-627 | ||
005 | 20230625222542.0 | ||
007 | cr uuu---uuuuu | ||
008 | 180603s2013 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.comnet.2013.05.010 |2 doi | |
028 | 5 | 2 | |a GBVA2013003000007.pica |
035 | |a (DE-627)ELV038542935 | ||
035 | |a (ELSEVIER)S1389-1286(13)00178-3 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | |a 004 |a 620 | |
082 | 0 | 4 | |a 004 |q DE-600 |
082 | 0 | 4 | |a 620 |q DE-600 |
082 | 0 | 4 | |a 610 |q VZ |
082 | 0 | 4 | |a 610 |q VZ |
084 | |a 44.44 |2 bkl | ||
100 | 1 | |a Shin, Seungwon |e verfasserin |4 aut | |
245 | 1 | 0 | |a EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection |
264 | 1 | |c 2013transfer abstract | |
300 | |a 15 | ||
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. | ||
520 | |a Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. | ||
650 | 7 | |a Botnet |2 Elsevier | |
650 | 7 | |a Network security |2 Elsevier | |
650 | 7 | |a Botnet detection |2 Elsevier | |
700 | 1 | |a Xu, Zhaoyan |4 oth | |
700 | 1 | |a Gu, Guofei |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Elsevier |a Poo, J.L. ELSEVIER |t Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls |d 2016 |d the international journal of computer and telecommunications networking |g Amsterdam [u.a.] |w (DE-627)ELV013796984 |
773 | 1 | 8 | |g volume:57 |g year:2013 |g number:13 |g day:9 |g month:09 |g pages:2628-2642 |g extent:15 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.comnet.2013.05.010 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
912 | |a SSG-OLC-PHA | ||
912 | |a GBV_ILN_40 | ||
936 | b | k | |a 44.44 |j Parasitologie |x Medizin |q VZ |
951 | |a AR | ||
952 | |d 57 |j 2013 |e 13 |b 9 |c 0909 |h 2628-2642 |g 15 | ||
953 | |2 045F |a 004 |
author_variant |
s s ss |
---|---|
matchkey_str |
shinseungwonxuzhaoyanguguofei:2013----:fotnwotewrcoeaefaeokoefcetnefc |
hierarchy_sort_str |
2013transfer abstract |
bklnumber |
44.44 |
publishDate |
2013 |
allfields |
10.1016/j.comnet.2013.05.010 doi GBVA2013003000007.pica (DE-627)ELV038542935 (ELSEVIER)S1389-1286(13)00178-3 DE-627 ger DE-627 rakwb eng 004 620 004 DE-600 620 DE-600 610 VZ 610 VZ 44.44 bkl Shin, Seungwon verfasserin aut EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection 2013transfer abstract 15 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. Botnet Elsevier Network security Elsevier Botnet detection Elsevier Xu, Zhaoyan oth Gu, Guofei oth Enthalten in Elsevier Poo, J.L. ELSEVIER Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls 2016 the international journal of computer and telecommunications networking Amsterdam [u.a.] (DE-627)ELV013796984 volume:57 year:2013 number:13 day:9 month:09 pages:2628-2642 extent:15 https://doi.org/10.1016/j.comnet.2013.05.010 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA GBV_ILN_40 44.44 Parasitologie Medizin VZ AR 57 2013 13 9 0909 2628-2642 15 045F 004 |
spelling |
10.1016/j.comnet.2013.05.010 doi GBVA2013003000007.pica (DE-627)ELV038542935 (ELSEVIER)S1389-1286(13)00178-3 DE-627 ger DE-627 rakwb eng 004 620 004 DE-600 620 DE-600 610 VZ 610 VZ 44.44 bkl Shin, Seungwon verfasserin aut EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection 2013transfer abstract 15 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. Botnet Elsevier Network security Elsevier Botnet detection Elsevier Xu, Zhaoyan oth Gu, Guofei oth Enthalten in Elsevier Poo, J.L. ELSEVIER Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls 2016 the international journal of computer and telecommunications networking Amsterdam [u.a.] (DE-627)ELV013796984 volume:57 year:2013 number:13 day:9 month:09 pages:2628-2642 extent:15 https://doi.org/10.1016/j.comnet.2013.05.010 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA GBV_ILN_40 44.44 Parasitologie Medizin VZ AR 57 2013 13 9 0909 2628-2642 15 045F 004 |
allfields_unstemmed |
10.1016/j.comnet.2013.05.010 doi GBVA2013003000007.pica (DE-627)ELV038542935 (ELSEVIER)S1389-1286(13)00178-3 DE-627 ger DE-627 rakwb eng 004 620 004 DE-600 620 DE-600 610 VZ 610 VZ 44.44 bkl Shin, Seungwon verfasserin aut EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection 2013transfer abstract 15 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. Botnet Elsevier Network security Elsevier Botnet detection Elsevier Xu, Zhaoyan oth Gu, Guofei oth Enthalten in Elsevier Poo, J.L. ELSEVIER Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls 2016 the international journal of computer and telecommunications networking Amsterdam [u.a.] (DE-627)ELV013796984 volume:57 year:2013 number:13 day:9 month:09 pages:2628-2642 extent:15 https://doi.org/10.1016/j.comnet.2013.05.010 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA GBV_ILN_40 44.44 Parasitologie Medizin VZ AR 57 2013 13 9 0909 2628-2642 15 045F 004 |
allfieldsGer |
10.1016/j.comnet.2013.05.010 doi GBVA2013003000007.pica (DE-627)ELV038542935 (ELSEVIER)S1389-1286(13)00178-3 DE-627 ger DE-627 rakwb eng 004 620 004 DE-600 620 DE-600 610 VZ 610 VZ 44.44 bkl Shin, Seungwon verfasserin aut EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection 2013transfer abstract 15 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. Botnet Elsevier Network security Elsevier Botnet detection Elsevier Xu, Zhaoyan oth Gu, Guofei oth Enthalten in Elsevier Poo, J.L. ELSEVIER Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls 2016 the international journal of computer and telecommunications networking Amsterdam [u.a.] (DE-627)ELV013796984 volume:57 year:2013 number:13 day:9 month:09 pages:2628-2642 extent:15 https://doi.org/10.1016/j.comnet.2013.05.010 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA GBV_ILN_40 44.44 Parasitologie Medizin VZ AR 57 2013 13 9 0909 2628-2642 15 045F 004 |
allfieldsSound |
10.1016/j.comnet.2013.05.010 doi GBVA2013003000007.pica (DE-627)ELV038542935 (ELSEVIER)S1389-1286(13)00178-3 DE-627 ger DE-627 rakwb eng 004 620 004 DE-600 620 DE-600 610 VZ 610 VZ 44.44 bkl Shin, Seungwon verfasserin aut EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection 2013transfer abstract 15 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. Botnet Elsevier Network security Elsevier Botnet detection Elsevier Xu, Zhaoyan oth Gu, Guofei oth Enthalten in Elsevier Poo, J.L. ELSEVIER Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls 2016 the international journal of computer and telecommunications networking Amsterdam [u.a.] (DE-627)ELV013796984 volume:57 year:2013 number:13 day:9 month:09 pages:2628-2642 extent:15 https://doi.org/10.1016/j.comnet.2013.05.010 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA GBV_ILN_40 44.44 Parasitologie Medizin VZ AR 57 2013 13 9 0909 2628-2642 15 045F 004 |
language |
English |
source |
Enthalten in Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls Amsterdam [u.a.] volume:57 year:2013 number:13 day:9 month:09 pages:2628-2642 extent:15 |
sourceStr |
Enthalten in Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls Amsterdam [u.a.] volume:57 year:2013 number:13 day:9 month:09 pages:2628-2642 extent:15 |
format_phy_str_mv |
Article |
bklname |
Parasitologie |
institution |
findex.gbv.de |
topic_facet |
Botnet Network security Botnet detection |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls |
authorswithroles_txt_mv |
Shin, Seungwon @@aut@@ Xu, Zhaoyan @@oth@@ Gu, Guofei @@oth@@ |
publishDateDaySort_date |
2013-01-09T00:00:00Z |
hierarchy_top_id |
ELV013796984 |
dewey-sort |
14 |
id |
ELV038542935 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV038542935</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625222542.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.comnet.2013.05.010</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2013003000007.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV038542935</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S1389-1286(13)00178-3</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="a">620</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">620</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">610</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">610</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">44.44</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shin, Seungwon</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2013transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">15</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Botnet</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Network security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Botnet detection</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xu, Zhaoyan</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gu, Guofei</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier</subfield><subfield code="a">Poo, J.L. ELSEVIER</subfield><subfield code="t">Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls</subfield><subfield code="d">2016</subfield><subfield code="d">the international journal of computer and telecommunications networking</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV013796984</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:57</subfield><subfield code="g">year:2013</subfield><subfield code="g">number:13</subfield><subfield code="g">day:9</subfield><subfield code="g">month:09</subfield><subfield code="g">pages:2628-2642</subfield><subfield code="g">extent:15</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.comnet.2013.05.010</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">44.44</subfield><subfield code="j">Parasitologie</subfield><subfield code="x">Medizin</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">57</subfield><subfield code="j">2013</subfield><subfield code="e">13</subfield><subfield code="b">9</subfield><subfield code="c">0909</subfield><subfield code="h">2628-2642</subfield><subfield code="g">15</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">004</subfield></datafield></record></collection>
|
author |
Shin, Seungwon |
spellingShingle |
Shin, Seungwon ddc 004 ddc 620 ddc 610 bkl 44.44 Elsevier Botnet Elsevier Network security Elsevier Botnet detection EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection |
authorStr |
Shin, Seungwon |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV013796984 |
format |
electronic Article |
dewey-ones |
004 - Data processing & computer science 620 - Engineering & allied operations 610 - Medicine & health |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
004 620 004 DE-600 620 DE-600 610 VZ 44.44 bkl EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection Botnet Elsevier Network security Elsevier Botnet detection Elsevier |
topic |
ddc 004 ddc 620 ddc 610 bkl 44.44 Elsevier Botnet Elsevier Network security Elsevier Botnet detection |
topic_unstemmed |
ddc 004 ddc 620 ddc 610 bkl 44.44 Elsevier Botnet Elsevier Network security Elsevier Botnet detection |
topic_browse |
ddc 004 ddc 620 ddc 610 bkl 44.44 Elsevier Botnet Elsevier Network security Elsevier Botnet detection |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
z x zx g g gg |
hierarchy_parent_title |
Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls |
hierarchy_parent_id |
ELV013796984 |
dewey-tens |
000 - Computer science, knowledge & systems 620 - Engineering 610 - Medicine & health |
hierarchy_top_title |
Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV013796984 |
title |
EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection |
ctrlnum |
(DE-627)ELV038542935 (ELSEVIER)S1389-1286(13)00178-3 |
title_full |
EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection |
author_sort |
Shin, Seungwon |
journal |
Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls |
journalStr |
Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works 600 - Technology |
recordtype |
marc |
publishDateSort |
2013 |
contenttype_str_mv |
zzz |
container_start_page |
2628 |
author_browse |
Shin, Seungwon |
container_volume |
57 |
physical |
15 |
class |
004 620 004 DE-600 620 DE-600 610 VZ 44.44 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Shin, Seungwon |
doi_str_mv |
10.1016/j.comnet.2013.05.010 |
dewey-full |
004 620 610 |
title_sort |
effort: a new host–network cooperated framework for efficient and effective bot malware detection |
title_auth |
EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection |
abstract |
Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. |
abstractGer |
Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. |
abstract_unstemmed |
Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA GBV_ILN_40 |
container_issue |
13 |
title_short |
EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection |
url |
https://doi.org/10.1016/j.comnet.2013.05.010 |
remote_bool |
true |
author2 |
Xu, Zhaoyan Gu, Guofei |
author2Str |
Xu, Zhaoyan Gu, Guofei |
ppnlink |
ELV013796984 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth |
doi_str |
10.1016/j.comnet.2013.05.010 |
up_date |
2024-07-06T18:32:17.795Z |
_version_ |
1803855580677275648 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV038542935</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625222542.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.comnet.2013.05.010</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2013003000007.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV038542935</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S1389-1286(13)00178-3</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="a">620</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">620</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">610</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">610</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">44.44</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shin, Seungwon</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">EFFORT: A new host–network cooperated framework for efficient and effective bot malware detection</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2013transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">15</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Bots are still a serious threat to Internet security. Although a lot of approaches have been proposed to detect bots at host or network level, they still have shortcomings. Host-level approaches can detect bots with high accuracy. However they usually pose too much overhead on the host. While network-level approaches can detect bots with less overhead, they have problems in detecting bots with encrypted, evasive communication C&C channels. In this paper, we propose EFFORT, a new host–network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both advantages, i.e., effectiveness and efficiency. Based on intrinsic characteristics of bots, we propose a multi-module approach to correlate information from different host- and network-level aspects and design a multi-layered architecture to efficiently coordinate modules to perform heavy monitoring only when necessary. We have implemented our proposed system and evaluated on real-world benign and malicious programs running on several diverse real-life office and home machines for several days. The final results show that our system can detect all 17 real-world bots (e.g., Waledac, Storm) with low false positives (0.68%) and with minimal overhead. We believe EFFORT raises a higher bar and this host–network cooperated design represents a timely effort and a right direction in the malware battle.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Botnet</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Network security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Botnet detection</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xu, Zhaoyan</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gu, Guofei</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier</subfield><subfield code="a">Poo, J.L. ELSEVIER</subfield><subfield code="t">Pharmacokinetics of the Antifibrotic Drug Pirfenidone in Child Pugh A and B Cirrhotic Patients Compared to Healthy Age-Matched Controls</subfield><subfield code="d">2016</subfield><subfield code="d">the international journal of computer and telecommunications networking</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV013796984</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:57</subfield><subfield code="g">year:2013</subfield><subfield code="g">number:13</subfield><subfield code="g">day:9</subfield><subfield code="g">month:09</subfield><subfield code="g">pages:2628-2642</subfield><subfield code="g">extent:15</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.comnet.2013.05.010</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">44.44</subfield><subfield code="j">Parasitologie</subfield><subfield code="x">Medizin</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">57</subfield><subfield code="j">2013</subfield><subfield code="e">13</subfield><subfield code="b">9</subfield><subfield code="c">0909</subfield><subfield code="h">2628-2642</subfield><subfield code="g">15</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">004</subfield></datafield></record></collection>
|
score |
7.400731 |