{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:45:14Z","timestamp":1742967914870,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030373511"},{"type":"electronic","value":"9783030373528"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37352-8_7","type":"book-chapter","created":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T20:03:00Z","timestamp":1577995380000},"page":"77-89","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion Detection Traps within Live Network Environment"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0371-9646","authenticated-orcid":false,"given":"Xiaochun","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Matus","family":"Mihok","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,3]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Bilge, L., Dumitras, T.: Before we knew it: an empirical study of zero-day attacks in the real world. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, North Carolina, USA, 16\u201318 October 2012, pp. 833\u2013844 (2012)","DOI":"10.1145\/2382196.2382284"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Pomsathit, A.: Performance analysis of IDS with honey pot on new media broadcasting. In: 2017 International Conference on Circuits, Devices and Systems, 5\u20138 September 2017, pp. 201\u2013204 (2017)","DOI":"10.1109\/ICCDS.2017.8120478"},{"key":"7_CR3","unstructured":"Nawrocki, M., Wahlisch, M., Schmidt, T., Keil, C., Schonfelder, J.: A Survey on Honeypot Software and Data Analysis, arXiv preprint, \narXiv:1608.06249\n\n (2016). \nhttps:\/\/arxiv.org\/pdf\/1608.06249.pdf\n\n. Accessed 12 June 2019"},{"key":"7_CR4","unstructured":"Opencanary.readthedocs.io: OpenCanary \u2014 OpenCanary 0.1 documentation (2019). \nhttps:\/\/opencanary.readthedocs.io\/en\/latest\n\n. Accessed 12 June 2019"},{"key":"7_CR5","unstructured":"Morris, A.: Kippo detect (2019). \nhttps:\/\/github.com\/andrew-morris\/kippo_detect\n\n. Accessed 12 June 2019"},{"key":"7_CR6","unstructured":"Wolfvan: Cowrie Detect (2019). GitHub. \nhttps:\/\/github.com\/wolfvan\/Cowrie_Detect\n\n. Accessed 12 June 2019"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Campbell, R., Padayachee, K., Masombuka, T.: A survey of honeypot research: trends and opportunities. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 208\u2013212 (2015)","DOI":"10.1109\/ICITST.2015.7412090"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Wafi, H., Fiade, A., Hakiem, N., Bahaweres, R.: Implementation of a modern security systems honeypot: honey network on wireless networks. In: 2017 International Young Engineers Forum (YEF-ECE), pp. 91\u201396 (2017)","DOI":"10.1109\/YEF-ECE.2017.7935647"},{"issue":"4","key":"7_CR9","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.cose.2006.02.009","volume":"25","author":"H Artail","year":"2006","unstructured":"Artail, H., Safa, H., Sraj, M., Kuwatly, I., Al-Masri, Z.: A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. Comput. Secur. 25(4), 274\u2013288 (2006)","journal-title":"Comput. Secur."},{"key":"7_CR10","unstructured":"Gaspari, F., Jajodia, S., Mancini, L.V., Panico, A.: AHEAD: a new architecture for active defense. In: Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, Vienna, Austria, 24 October 2016, pp. 11\u201316 (2016). ISBN 978-1-4503-4566-8"},{"key":"7_CR11","unstructured":"Elastic.co: Powering Data Search, Log Analysis, Analytics | Elastic (2019). \nhttps:\/\/ww.elastic.co\/products\n\n. Accessed 12 June 2019"},{"key":"7_CR12","unstructured":"VMWare (2019). \nhttps:\/\/www.vmware.com\/products\/esxi-and-esx.html\n\n. Accessed 12 June 2019"},{"key":"7_CR13","unstructured":"Ibm.com: Monitor file system activity with inotify (2019). \nhttps:\/\/www.ibm.com\/developerworks\/library\/l-ubuntu-inotify\/index.html\n\n. Accessed 12 June 2019"},{"key":"7_CR14","unstructured":"Elastic.co: Filebeat: Lightweight Log Analysis & Elasticsearch | Elastic (2019). \nhttps:\/\/www.elastic.co\/products\/beats\/filebeat\n\n. Accessed 12 June 2019"},{"key":"7_CR15","doi-asserted-by":"publisher","unstructured":"Kaur, N., Singh, M.: Improved file system security through restrictive access. In: 2016 International Conference on Inventive Computation Technologies (ICICT), vol. 3 (2016). \nhttps:\/\/doi.org\/10.1109\/inventive.2016.7830207","DOI":"10.1109\/inventive.2016.7830207"},{"key":"7_CR16","unstructured":"Gibbs, M.: Sharing with samba. Netw. World 20(30), 28 (2003). \nhttps:\/\/www.networkworld.com\/article\/2335460\/sharing-with-samba.html\n\n. Accessed 12 June 2019"},{"key":"7_CR17","unstructured":"Msdn.microsoft.com: FindFirstChangeNotification function (Windows) (2019). \nhttps:\/\/msdn.microsoft.com\/enus\/library\/windows\/desktop\/aa364417(v=vs.85).aspx\n\n. Accessed 12 June 2019"},{"key":"7_CR18","doi-asserted-by":"publisher","unstructured":"Stockman, M., Rein, R., Heile, A.: An open-source honeynet system to study system banner message effects on hackers. In: Proceedings of the 4th Annual ACM Conference on Research in Information Technology, Chicago, Illinois, USA, 30 September\u201303 October 2015, pp. 19\u201322 (2015). \nhttps:\/\/doi.org\/10.1145\/2808062.2808069\n\n. ISBN 978-1-4503-3836-3","DOI":"10.1145\/2808062.2808069"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"38860","DOI":"10.1109\/ACCESS.2018.2852329","volume":"6","author":"C Gao","year":"2018","unstructured":"Gao, C., Lv, S., Wei, Y., Wang, Z., Liu, Z., Cheng, X.: An effective searchable symmetric encryption with enhanced security for mobile devices. IEEE Access 6, 38860\u201338869 (2018). ISSN 2169-3536","journal-title":"IEEE Access"},{"issue":"1","key":"7_CR20","doi-asserted-by":"publisher","first-page":"9091","DOI":"10.1109\/ACCESS.2018.2799210","volume":"6","author":"C Wang","year":"2018","unstructured":"Wang, C., Zhao, Z., Gong, L., Zhu, L., Liu, Z., Cheng, X.: A distributed anomaly detection system for in-vehicle network using HTM. IEEE Access 6(1), 9091\u20139098 (2018)","journal-title":"IEEE Access"},{"issue":"3","key":"7_CR21","doi-asserted-by":"publisher","first-page":"878","DOI":"10.3390\/s18030878","volume":"18","author":"C Wang","year":"2018","unstructured":"Wang, C., Zhu, L., Gong, L., Zhao, Z., Yang, L., Liu, Z., Cheng, X.: Accurate sybil attack detection based on fine-grained physical channel information. Sensors 18(3), 878 (2018). ISSN 1424-8220","journal-title":"Sensors"},{"issue":"5","key":"7_CR22","doi-asserted-by":"publisher","first-page":"848","DOI":"10.3390\/app9050848","volume":"9","author":"D Dinculean\u0103","year":"2019","unstructured":"Dinculean\u0103, D., Cheng, X.: Vulnerabilities and limitations of MQTT protocol used between IoT devices. Appl. Sci. 9(5), 848 (2019)","journal-title":"Appl. Sci."},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Shi F, Chen Z, Cheng X: Behaviour modelling and individual recognition of sonar transmitter for secure communication in UASNs. IEEE Access (2019). \nhttps:\/\/doi.org\/10.1109\/access.2019.2923059\n\n. Print ISSN 2169-3536, Online ISSN 2169-3536","DOI":"10.1109\/access.2019.2923059"},{"key":"7_CR24","doi-asserted-by":"publisher","first-page":"103751","DOI":"10.1109\/ACCESS.2019.2931061","volume":"7","author":"J Men","year":"2019","unstructured":"Men, J., Xu, G., Han, Z., Sun, Z., Zhou, X., Lian, W., Cheng, X.: Finding sands in the eyes: vulnerabilities discovery in IoT with EUFuzzer on human machine interface. IEEE Access 7, 103751\u2013103759 (2019)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37352-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T00:35:26Z","timestamp":1578011726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37352-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030373511","9783030373528"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37352-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"3 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/css2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"235","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}