{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:47:56Z","timestamp":1756385276618,"version":"3.37.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000059"},{"type":"electronic","value":"9783030000066"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00006-6_27","type":"book-chapter","created":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T15:27:56Z","timestamp":1540999676000},"page":"303-313","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Improved ICS Honeypot Based on SNAP7 and IMUNES"],"prefix":"10.1007","author":[{"given":"Chenpeng","family":"Ding","sequence":"first","affiliation":[]},{"given":"Jiangtao","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Yuewei","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,1]]},"reference":[{"key":"27_CR1","unstructured":"Duqu. \nhttp:\/\/www.crysys.hu\/publications\/files\/bencsathPBFllduqu\n\n. Accessed 7 Sept 2017"},{"key":"27_CR2","unstructured":"SkyWiper. \nhttp:\/\/www.crysys.hu\/skywiper\/skywiper\n\n. Accessed 7 Sept 2017"},{"issue":"16","key":"27_CR3","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","volume":"1","author":"I Butun","year":"2014","unstructured":"Butun, I., Morgera, S., Sankar, R.: A survey of\u00a0intrusion detection\u00a0systems in wireless sensor networks. IEEE Commun. Surv. 1(16), 266\u2013282 (2014)","journal-title":"IEEE Commun. Surv."},{"issue":"6","key":"27_CR4","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/TII.2012.2198666","volume":"1","author":"M Cheminod","year":"2013","unstructured":"Cheminod, M., Durante, I., Valenzano, A.: Review of security issues in industrial networks. IEEE Trans. Ind. Inform. 1(6), 277\u2013293 (2013)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"8","key":"27_CR5","first-page":"80","volume":"1","author":"K Stouffer","year":"2015","unstructured":"Stouffer, K., Pillitteri, V., Lightman, S.: Guide to industrial control systems security. NIST Spec. Publ. 1(8), 80\u201382 (2015)","journal-title":"NIST Spec. Publ."},{"key":"27_CR6","unstructured":"The conpot project. \nhttp:\/\/www.conpot.org\n\n. Accessed 12 Nov 2017"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-319-10329-7_12","volume-title":"Smart Grid Security","author":"DI Buza","year":"2014","unstructured":"Buza, D.I., Juh\u00e1sz, F., Miru, G., F\u00e9legyh\u00e1zi, M., Holczer, T.: CryPLH: protecting smart energy systems from targeted attacks with a PLC honeypot. In: Cuellar, J. (ed.) SmartGridSec 2014. LNCS, vol. 8448, pp. 181\u2013192. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-10329-7_12"},{"issue":"16","key":"27_CR8","first-page":"1823","volume":"10","author":"L Stephan","year":"2016","unstructured":"Stephan, L., Johannes, K., Stephan, A.: POSTER: towards highly interactive honeypots for industrial control systems. Comput. Commun. Secur. 10(16), 1823\u20131825 (2016)","journal-title":"Comput. Commun. Secur."},{"key":"27_CR9","unstructured":"SNAP7. \nhttps:\/\/snap7.sourceforge.net\n\n. Accessed 9 Mar 2018"},{"key":"27_CR10","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.ress.2015.02.008","volume":"139","author":"S Kriaa","year":"2015","unstructured":"Kriaa, S., Pietre-Cambacedes, L., Bouissou, M.: A survey of approaches combining safety and security for industrial control system. Reliab. Eng. Syst. Saf. 139, 156\u2013178 (2015)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"27_CR11","unstructured":"Wilhiot, K.: Who\u2019s really attacking your ICS equipment. Trend Micro Incorporated (2013)"},{"key":"27_CR12","unstructured":"Stipe, K., Stjepan, G., Miljenko, M.: An experiment in using IMUNES and conpot to emulate honeypot control networks. In: IEEE Information and Communication Technology (2017)"},{"issue":"7","key":"27_CR13","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.ijcip.2014.03.001","volume":"2","author":"R Bodenheim","year":"2014","unstructured":"Bodenheim, R., Butts, J., Dunlap, S., Mullins, S.: Evaluation of the ability of the\u00a0Shodan\u00a0search engine to identify Internet-facing industrial control devices. Int. J. Crit. Infrastruct. Prot. 2(7), 114\u2013123 (2014)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"27_CR14","first-page":"239","volume":"2","author":"D Merkel","year":"2014","unstructured":"Merkel, D.: Docker: lightweight linux containers for consistent development and deployment. Linux J. 2, 239 (2014)","journal-title":"Linux J."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00006-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T15:37:03Z","timestamp":1541000223000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00006-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000059","9783030000066"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00006-6_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}