{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:28:44Z","timestamp":1761676124909,"version":"3.40.4"},"publisher-location":"New York, NY","reference-count":34,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461492771"},{"type":"electronic","value":"9781461492788"}],"license":[{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-9278-8_12","type":"book-chapter","created":{"date-parts":[[2014,1,23]],"date-time":"2014-01-23T08:28:40Z","timestamp":1390465720000},"page":"261-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Computational Decoys for Cloud Security"],"prefix":"10.1007","author":[{"given":"Georgios","family":"Kontaxis","sequence":"first","affiliation":[]},{"given":"Michalis","family":"Polychronakis","sequence":"additional","affiliation":[]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,7]]},"reference":[{"key":"12_CR1","unstructured":"Hacker Posts 6.4 Million LinkedIn Passwords. http:\/\/www.technewsdaily.com\/7839-linked-passwords-hack.html. December 2012."},{"key":"12_CR2","unstructured":"Sony Hacked Again, 1 Million Passwords Exposed. http:\/\/www.informationweek.com\/security\/attacks\/sony-hacked-again-1-million-passwords-ex\/229900111."},{"key":"12_CR3","unstructured":"Twitter detects and shuts down password data hack in progress. http:\/\/arstechnica.com\/security\/2013\/02\/twitter-detects-and-shuts-down-password-data-hack-in-progress\/. February 2013."},{"key":"12_CR4","unstructured":"Kostas\u00a0G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Kostas Xinidis, Evangelos\u00a0P. Markatos, and Angelos\u00a0D. Keromytis. Detecting Targeted Attacks Using Shadow Honeypots. In Proceedings of the 14 th USENIX Security Symposium, pages\u00a0129\u2013144, August 2005."},{"key":"12_CR5","unstructured":"Guangdong Bai, Jike Lei, Guozhu Meng, Sai\u00a0Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun, Yang Liu, and Jin\u00a0Song Dong. AUTHSCAN: Automatic extraction of web authentication protocols from implementations. In Proceedings of the 20th Network and Distributed Systems Security Symposium (NDSS), 2013."},{"issue":"1","key":"12_CR6","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MC.2012.16","volume":"45","author":"H. Berghel","year":"2012","unstructured":"H.\u00a0Berghel. Identity theft and financial fraud: Some strangeness in the proportions. Computer, 45(1):86\u201389, Jan. 2012.","journal-title":"Computer"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Hristo Bojinov, Elie Bursztein, Xavier Boyen, and Dan Boneh. Kamouflage: Loss-resistant password management. In Proc. of ESORICS\u201910, 2010.","DOI":"10.1007\/978-3-642-15497-3_18"},{"issue":"2\u20133","key":"12_CR8","doi-asserted-by":"crossref","first-page":"199","DOI":"10.3233\/JCS-2011-0439","volume":"20","author":"Brian M. Bowen","year":"2012","unstructured":"Brian\u00a0M. Bowen, Vasileios\u00a0P. Kemerlis, Pratap\u00a0V. Prabhu, Angelos\u00a0D. Keromytis, and Salvatore\u00a0J. Stolfo. A system for generating and injecting indistinguishable network decoys. Journal of Computer Security, 20(2\u20133):199\u2013221, 2012.","journal-title":"Journal of Computer Security"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Brian\u00a0M. Bowen, Pratap Prabhu, Vasileios\u00a0P. Kemerlis, Stelios Sidiroglou, Angelos\u00a0D. Keromytis, and Salvatore\u00a0J. Stolfo. Botswindler: tamper resistant injection of believable decoys in vm-based hosts for crimeware detection. In Proceedings of the 13th international conference on Recent advances in intrusion detection, RAID\u201910, pages\u00a0118\u2013137, Berlin, Heidelberg, 2010. Springer-Verlag.","DOI":"10.1007\/978-3-642-15512-3_7"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Kevin\u00a0D. Bowers, Ari Juels, and Alina Oprea. HAIL: a High-Availability and Integrity Layer for Cloud Storage. In Proc. of CCS, pages\u00a0187\u2013198, 2009.","DOI":"10.1145\/1653662.1653686"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Andrew Brown and Jeff Chase. Trusted Platform-as-a-Service: A Foundation for Trustworthy Cloud-Hosted Applications. In Proc. of CCSW, 2011.","DOI":"10.1145\/2046660.2046665"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Paolo\u00a0Milani Comparetti, Gilbert Wondracek, Christopher Kruegel, and Engin Kirda. Prospex: Protocol specification extraction. In Proceedings of the 30th IEEE Symposium on Security and Privacy, pages\u00a0110\u2013125, 2009.","DOI":"10.1109\/SP.2009.14"},{"key":"12_CR13","unstructured":"Computerworld. Microsoft BPOS cloud service hit with data breach, Dec 2010. http:\/\/www.computerworld.com\/s\/article\/9202078\/Microsoft_BPOS_cloud_service_hit_with_data_breach."},{"key":"12_CR14","unstructured":"Weidong Cui, Vern Paxson, Nicholas\u00a0C. Weaver, and Y\u00a0H. Katz. Protocol-independent adaptive replay of application dialog. In Proceedings of the 13th Network and Distributed System Security Symposium (NDSS), 2006."},{"key":"12_CR15","unstructured":"Holger Dreger, Anja Feldmann, Michael Mai, Vern Paxson, and Robin Sommer. Dynamic application-layer protocol analysis for network intrusion detection. In Proceedings of the 15th USENIX Security Symposium, 2006."},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Chris Erway, Alptekin K\u00fcp\u00e7\u00fc, Charalampos Papamanthou, and Roberto Tamassia. Dynamic provable data possession. In Proceedings of the 16th ACM conference on Computer and Communications Security (CCS), pages\u00a0213\u2013222, 2009.","DOI":"10.1145\/1653662.1653688"},{"key":"12_CR17","unstructured":"Dennis Hollingsworth. Enhancing computer system security. Technical Report P-5064, RAND Corporation, Aug 1973."},{"key":"12_CR18","unstructured":"Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, and Xiangyu Zhang. Automatic protocol format reverse engineering through context-aware monitored execution. In Proceedings of the 15th Network and Distributed System Security Symposium (NDSS), 2008."},{"key":"12_CR19","unstructured":"Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay\u00a0Janapa Reddi, and Kim Hazelwood. Pin: building customized program analysis tools with dynamic instrumentation. In Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, PLDI \u201905, pages\u00a0190\u2013200, New York, NY, USA, 2005. ACM."},{"key":"12_CR20","unstructured":"Yogesh Mundada, Anirudh Ramachandran, and Nick Feamster. SilverLine: Data and Network Isolation for Cloud Services. In Proc. of HotCloud, 2011."},{"key":"12_CR21","unstructured":"Niels Provos. A virtual honeypot framework. In Proceedings of the 13 th USENIX Security Symposium, pages\u00a01\u201314, August 2004."},{"key":"12_CR22","unstructured":"Niels Provos and Thorsten Holz. Virtual honeypots: from botnet tracking to intrusion detection. Addison-Wesley Professional, 2007."},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proc. of CCS, pages\u00a0199\u2013212, 2009.","DOI":"10.1145\/1653662.1653687"},{"issue":"2","key":"12_CR24","first-page":"27","volume":"3","author":"Neil C. Rowe","year":"2004","unstructured":"Neil\u00a0C. Rowe and Hy\u00a0S. Rothstein. Two taxonomies of deception for attacks on information systems. Journal of Information Warfare, 3(2):27\u201339, 2004.","journal-title":"Journal of Information Warfare"},{"key":"12_CR25","unstructured":"Sophos. Groupon subsidiary leaks 300k logins, fixes fail, fails again, 2011 Jun. http:\/\/nakedsecurity.sophos.com\/2011\/06\/30\/groupon-subsidiary-leaks-300k-logins-fixes-fail-fails-again\/."},{"key":"12_CR26","volume-title":"Honeypots: Tracking Hackers","author":"Lance Spitzner","year":"2002","unstructured":"Lance Spitzner. Honeypots: Tracking Hackers. Addison-Wesley Longman Publishing Co., Inc., 2002."},{"key":"12_CR27","unstructured":"Lance Spitzner. Honeytokens: The other honeypot, Jul 2003. http:\/\/www.symantec.com\/connect\/articles\/honeytokens-other-honeypot."},{"issue":"5","key":"12_CR28","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1145\/42411.42412","volume":"31","author":"Clifford Stoll","year":"1988","unstructured":"Clifford Stoll. Stalking the wily hacker. Communications of the ACM, 31(5):484\u2013497, 1988.","journal-title":"Communications of the ACM"},{"key":"12_CR29","unstructured":"The Wall Street Journal. Google Discloses Privacy Glitch, 2009 Mar. http:\/\/blogs.wsj.com\/digits\/2009\/03\/08\/1214\/."},{"key":"12_CR30","unstructured":"Trusted Computing Group. TPM Main Specification. http:\/\/www.trustedcomputinggroup.org\/resources\/tpm_main_specification."},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Rui Wang, Shuo Chen, and XiaoFeng Wang. Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP \u201912, pages\u00a0365\u2013379, Washington, DC, USA, 2012. IEEE Computer Society.","DOI":"10.1109\/SP.2012.30"},{"key":"12_CR32","unstructured":"Gilbert Wondracek, Paolo\u00a0Milani Comparetti, Christopher Kruegel, and Engin Kirda. Automatic network protocol analysis. In Proceedings of the 15th Network and Distributed System Security Symposium (NDSS), 2008."},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"J.\u00a0Yuill, M.\u00a0Zappe, D.\u00a0Denning, and F.\u00a0Feer. Honeyfiles: Deceptive files for intrusion detection. In Proceedings of the 5th IEEE Workshop on Information Assurance, pages\u00a0116\u2013122, Jun 2004.","DOI":"10.1109\/IAW.2004.1437806"},{"issue":"3","key":"12_CR34","first-page":"26","volume":"5","author":"Jim Yuill","year":"2006","unstructured":"Jim Yuill, Dorothy Denning, and Fred Feer. Using deception to hide things from hackers: Processes, principles, and techniques. Journal of Information Warfare, 5(3):26\u201340, 2006.","journal-title":"Journal of Information Warfare"}],"container-title":["Secure Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-9278-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:51:01Z","timestamp":1746118261000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-9278-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,7]]},"ISBN":["9781461492771","9781461492788"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-9278-8_12","relation":{},"subject":[],"published":{"date-parts":[[2013,12,7]]},"assertion":[{"value":"7 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}