{"id":"https://openalex.org/W1911265942","doi":"https://doi.org/10.1007/978-3-642-24864-1_2","title":"Botnets as an Instrument of Warfare","display_name":"Botnets as an Instrument of Warfare","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W1911265942","doi":"https://doi.org/10.1007/978-3-642-24864-1_2","mag":"1911265942"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-24864-1_2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-24864-1_2","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-24864-1_2.pdf","source":{"id":"https://openalex.org/S4210175514","display_name":"IFIP International Federation for Information Processing/IFIP","issn_l":"1571-5736","issn":["1571-5736","1861-2288"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-24864-1_2.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045186112","display_name":"Eric Koziel","orcid":null},"institutions":[{"id":"https://openalex.org/I2799950915","display_name":"Wright-Patterson Air Force Base","ror":"https://ror.org/0097e1k27","country_code":"US","type":"other","lineage":["https://openalex.org/I1330347796","https://openalex.org/I2799950915","https://openalex.org/I4210089612","https://openalex.org/I4210102105"]},{"id":"https://openalex.org/I55061410","display_name":"U.S. Air Force Institute of Technology","ror":"https://ror.org/03f9f1d95","country_code":"US","type":"education","lineage":["https://openalex.org/I1294991024","https://openalex.org/I1330347796","https://openalex.org/I1330347796","https://openalex.org/I2802362820","https://openalex.org/I4210089612","https://openalex.org/I4210102105","https://openalex.org/I4210102105","https://openalex.org/I55061410"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Eric Koziel","raw_affiliation_strings":["Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA","Air Force Inst. of Technol., Wright-Patterson Air Force Base"],"affiliations":[{"raw_affiliation_string":"Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA","institution_ids":["https://openalex.org/I55061410","https://openalex.org/I2799950915"]},{"raw_affiliation_string":"Air Force Inst. of Technol., Wright-Patterson Air Force Base","institution_ids":["https://openalex.org/I55061410"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062467542","display_name":"David Robinson","orcid":null},"institutions":[{"id":"https://openalex.org/I55061410","display_name":"U.S. Air Force Institute of Technology","ror":"https://ror.org/03f9f1d95","country_code":"US","type":"education","lineage":["https://openalex.org/I1294991024","https://openalex.org/I1330347796","https://openalex.org/I1330347796","https://openalex.org/I2802362820","https://openalex.org/I4210089612","https://openalex.org/I4210102105","https://openalex.org/I4210102105","https://openalex.org/I55061410"]},{"id":"https://openalex.org/I2799950915","display_name":"Wright-Patterson Air Force Base","ror":"https://ror.org/0097e1k27","country_code":"US","type":"other","lineage":["https://openalex.org/I1330347796","https://openalex.org/I2799950915","https://openalex.org/I4210089612","https://openalex.org/I4210102105"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Robinson","raw_affiliation_strings":["Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA","Air Force Inst. of Technol., Wright-Patterson Air Force Base"],"affiliations":[{"raw_affiliation_string":"Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA","institution_ids":["https://openalex.org/I55061410","https://openalex.org/I2799950915"]},{"raw_affiliation_string":"Air Force Inst. of Technol., Wright-Patterson Air Force Base","institution_ids":["https://openalex.org/I55061410"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045186112"],"corresponding_institution_ids":["https://openalex.org/I2799950915","https://openalex.org/I55061410"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21005141,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9697601795196533},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7906211018562317},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7117776870727539},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5855504274368286},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5096685886383057},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4841040372848511},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.47268277406692505},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.4510915279388428},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3548840284347534},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.32335007190704346},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2594901919364929},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14675208926200867},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.07928928732872009}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9697601795196533},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7906211018562317},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7117776870727539},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5855504274368286},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5096685886383057},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4841040372848511},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.47268277406692505},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.4510915279388428},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3548840284347534},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.32335007190704346},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2594901919364929},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14675208926200867},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.07928928732872009},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C2776401274","wikidata":"https://www.wikidata.org/wiki/Q3756855","display_name":"Accretion (finance)","level":2,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-24864-1_2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-24864-1_2","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-24864-1_2.pdf","source":{"id":"https://openalex.org/S4210175514","display_name":"IFIP International Federation for Information Processing/IFIP","issn_l":"1571-5736","issn":["1571-5736","1861-2288"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01571771v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01571771","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. pp.19-28, &#x27E8;10.1007/978-3-642-24864-1_2&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"doi:10.1007/978-3-642-24864-1_2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-24864-1_2","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-24864-1_2.pdf","source":{"id":"https://openalex.org/S4210175514","display_name":"IFIP International Federation for Information Processing/IFIP","issn_l":"1571-5736","issn":["1571-5736","1861-2288"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1911265942.pdf","grobid_xml":"https://content.openalex.org/works/W1911265942.grobid-xml"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W1561010465","https://openalex.org/W1972197573","https://openalex.org/W2100307718","https://openalex.org/W2102262986","https://openalex.org/W2128509737","https://openalex.org/W2154874878","https://openalex.org/W2159306446","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W2938399969","https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964","https://openalex.org/W4230824443","https://openalex.org/W2292210693","https://openalex.org/W2097156747"],"abstract_inverted_index":{"The":[0],"use":[1,70,118],"of":[2,71,75,86,92,104,119],"botnets":[3,21,55,72,87,120],"for":[4],"malicious":[5],"activities":[6],"has":[7],"grown":[8],"significantly":[9],"in":[10,46],"recent":[11],"years.":[12],"Criminals":[13],"leverage":[14],"the":[15,69,102,107,110,117],"flexibility":[16],"and":[17,30,64,94,112],"anonymity":[18],"associated":[19,115],"with":[20,116],"to":[22,40,60,81],"harvest":[23],"personal":[24],"data,":[25],"generate":[26],"spam,":[27,90],"distribute":[28],"malware":[29],"launch":[31],"distributed":[32,50,95],"denial-of-service":[33,51,96],"attacks.":[34],"These":[35],"same":[36],"attributes":[37],"readily":[38],"translate":[39],"applications":[41,85],"that":[42],"can":[43,98],"support":[44],"operations":[45],"warfare.":[47,76,105],"In":[48],"2007,":[49],"attacks":[52,97],"launched":[53],"by":[54,121],"targeted":[56],"IT":[57],"assets":[58],"belonging":[59],"Estonian":[61],"banks,":[62],"newspapers":[63],"parliament.":[65],"This":[66],"paper":[67,108],"explores":[68],"as":[73,89],"instruments":[74],"Seven":[77],"scenarios":[78],"are":[79],"used":[80],"demonstrate":[82],"how":[83],"traditional":[84],"such":[88],"theft":[91],"resources":[93],"have":[99],"implications":[100],"across":[101],"spectrum":[103],"Additionally,":[106],"discusses":[109],"ethical":[111],"political":[113],"concerns":[114],"nation":[122],"states.":[123]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
