{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:42:10Z","timestamp":1742913730234,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030657253"},{"type":"electronic","value":"9783030657260"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-65726-0_26","type":"book-chapter","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T15:03:34Z","timestamp":1608649414000},"page":"295-306","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Modelling Medical Devices with Honeypots"],"prefix":"10.1007","author":[{"given":"Jouni","family":"Ihanus","sequence":"first","affiliation":[]},{"given":"Tero","family":"Kokkonen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,22]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"113","DOI":"10.26636\/jtit.2019.130218","volume":"1","author":"M Akbanov","year":"2019","unstructured":"Akbanov, M., Vassilakis, V.: Wannacry ransomware: analysis of infection, persistence, recovery prevention and propagation mechanisms. J. Telecommun. Inf. Technol. 1, 113\u2013124 (2019). https:\/\/doi.org\/10.26636\/jtit.2019.130218","journal-title":"J. Telecommun. Inf. Technol."},{"unstructured":"Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E., Keromytis, A.D.: Detecting targeted attacks using shadow honeypots. In: Proceedings of the 14th Conference on USENIX Security Symposium - vol. 14, p. 9. SSYM 2005, USENIX Association, USA (2005)","key":"26_CR2"},{"doi-asserted-by":"publisher","unstructured":"Anwar, A.H., Kamhoua, C., Leslie, N.: Honeypot allocation over attack graphs in cyber deception games. In: 2020 International Conference on Computing, Networking and Communications (ICNC), pp. 502\u2013506, February 2020. https:\/\/doi.org\/10.1109\/ICNC47757.2020.9049764","key":"26_CR3","DOI":"10.1109\/ICNC47757.2020.9049764"},{"doi-asserted-by":"publisher","unstructured":"Basnet, R., Mukherjee, S., Pagadala, V.M., Ray, I.: An efficient implementation of next generation access control for the mobile health cloud. In: 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), pp. 131\u2013138, April 2018. https:\/\/doi.org\/10.1109\/FMEC.2018.8364055","key":"26_CR4","DOI":"10.1109\/FMEC.2018.8364055"},{"doi-asserted-by":"publisher","unstructured":"Bauer, J., Goltz, J., Mundt, T., Wiedenmann, S.: Honeypots for threat intelligence in building automation systems. In: 2019 Computing, Communications and IoT Applications (ComComAp), pp. 242\u2013246, October 2019. https:\/\/doi.org\/10.1109\/ComComAp46287.2019.9018776","key":"26_CR5","DOI":"10.1109\/ComComAp46287.2019.9018776"},{"doi-asserted-by":"publisher","unstructured":"Bhargavi, U., Gundibail, S., Manjunath, K., Renuka, A.: Security of medical big data images using decoy technique. In: 2019 International Conference on Automation, Computational and Technology Management (ICACTM), pp. 310\u2013314, April 2019. https:\/\/doi.org\/10.1109\/ICACTM.2019.8776696","key":"26_CR6","DOI":"10.1109\/ICACTM.2019.8776696"},{"unstructured":"Dav\u00e9, N.: Cyberattacks on medical devices are on the rise\u2013and manufacturers must respond. https:\/\/spectrum.ieee.org\/the-human-os\/biomedical\/devices\/cyber-attacks-on-medical-devices-are-on-the-riseand-manufacturers-must-respond (2019). Accessed 29 April 2020","key":"26_CR7"},{"doi-asserted-by":"publisher","unstructured":"Djanali, S., Arunanto, F.X., Pratomo, B.A., Baihaqi, A., Studiawan, H., Shiddiqi, A.M.: Aggressive web application honeypot for exposing attacker\u2019s identity. In: 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering, pp. 212\u2013216, November 2014. https:\/\/doi.org\/10.1109\/ICITACEE.2014.7065744","key":"26_CR8","DOI":"10.1109\/ICITACEE.2014.7065744"},{"issue":"1","key":"26_CR9","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1518\/001872095779049543","volume":"37","author":"M Endsley","year":"1995","unstructured":"Endsley, M.: Toward a theory of situation awareness in dynamic systems. Hum. Factors 37(1), 32\u201364 (1995). https:\/\/doi.org\/10.1518\/001872095779049543","journal-title":"Hum. Factors"},{"doi-asserted-by":"crossref","unstructured":"European Commission: Medical Devices. https:\/\/ec.europa.eu\/growth\/sectors\/medical-devices_en (2020). Accessed 17 May 2020","key":"26_CR10","DOI":"10.1016\/B978-0-12-814962-1.00002-8"},{"doi-asserted-by":"crossref","unstructured":"Fadlullah, Z.M., et al.: Combating against attacks on encrypted protocols. In: 2007 IEEE International Conference on Communications, pp. 1211\u20131216 (2007)","key":"26_CR11","DOI":"10.1109\/ICC.2007.205"},{"unstructured":"Forescout Technologies Inc: putting healthcare security under the microscope. https:\/\/www.forescout.com\/company\/resources\/forescout-healthcare-report\/ (2019). Accessed 20 April 2020","key":"26_CR12"},{"doi-asserted-by":"publisher","unstructured":"Fraunholz, D., Zimmermann, M., Schotten, H.D.: An adaptive honeypot configuration, deployment and maintenance strategy. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), pp. 53\u201357, February 2017. https:\/\/doi.org\/10.23919\/ICACT.2017.7890056","key":"26_CR13","DOI":"10.23919\/ICACT.2017.7890056"},{"unstructured":"Ihanus, J.: Expanding Cyber Situation Awareness with Honeypots in Corporate Environment. M. eng. thesis, Jyv\u00e4skyl\u00e4 University of Applied Sciences, Finland (2019)","key":"26_CR14"},{"doi-asserted-by":"publisher","unstructured":"Kovanen, T., David, G., H\u00e4m\u00e4l\u00e4inen, T.: Survey: intrusion detection systems in encrypted traffic, vol. 9870, pp. 281\u2013293, September 2016. https:\/\/doi.org\/10.1007\/978-3-319-46301-8_23","key":"26_CR15","DOI":"10.1007\/978-3-319-46301-8_23"},{"doi-asserted-by":"publisher","unstructured":"Lihet, M., Dadarlat, V.: Honeypot in the cloud five years of data analysis. In: 2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet), pp. 1\u20136, September 2018. https:\/\/doi.org\/10.1109\/ROEDUNET.2018.8514128","key":"26_CR16","DOI":"10.1109\/ROEDUNET.2018.8514128"},{"doi-asserted-by":"publisher","unstructured":"Mayorga, F., Vargas, J., \u00c1lvarez, E., Martinez, H.D.: Honeypot network configuration through cyberattack patterns. In: 2019 International Conference on Information Systems and Computer Science (INCISCOS), pp. 150\u2013155, November 2019. https:\/\/doi.org\/10.1109\/INCISCOS49368.2019.00032","key":"26_CR17","DOI":"10.1109\/INCISCOS49368.2019.00032"},{"unstructured":"van der Meulen, R.: Build adaptive security architecture into your organization. https:\/\/www.gartner.com\/smarterwithgartner\/build-adaptive-security-architecture-into-your-organization\/, Jun 2017. Accessed 3 April 2020","key":"26_CR18"},{"doi-asserted-by":"publisher","unstructured":"Mokube, I., Adams, M.: Honeypots: concepts, approaches, and challenges, pp. 321\u2013326, January 2007. https:\/\/doi.org\/10.1145\/1233341.1233399","key":"26_CR19","DOI":"10.1145\/1233341.1233399"},{"unstructured":"Myllykangas, T.: You need to patch the bluekeep rdp vulnerability (CVE-2019-0708). https:\/\/blog.f-secure.com\/patch-bluekeep-rdp-vulnerability-cve-2019-0708\/ (2019). Accessed 29 April 2020","key":"26_CR20"},{"doi-asserted-by":"publisher","unstructured":"Nagpal, B., Singh, N., Chauhan, N., Sharma, P.: Catch: comparison and analysis of tools covering honeypots. In: 2015 International Conference on Advances in Computer Engineering and Applications, pp. 783\u2013786, March 2015. https:\/\/doi.org\/10.1109\/ICACEA.2015.7164809","key":"26_CR21","DOI":"10.1109\/ICACEA.2015.7164809"},{"unstructured":"Nelson, R., Staggers, N.: Health Informatics - E-Book: An Interprofessional Approach. Elsevier Health Sciences (2016). https:\/\/books.google.fi\/books?id=eROwDQAAQBAJ","key":"26_CR22"},{"unstructured":"Palo Alto Networks, Unit 42: 2020 Unit 42 IoT Threat Report. https:\/\/unit42.paloaltonetworks.com\/iot-threat-report-2020\/ (2020). Accessed 3 May 2020","key":"26_CR23"},{"key":"26_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-030-12942-2_18","volume-title":"Innovative Security Solutions for Information Technology and Communications","author":"S Puuska","year":"2019","unstructured":"Puuska, S., Kokkonen, T., Alatalo, J., Heilimo, E.: Anomaly-based network intrusion detection using wavelets and adversarial autoencoders. In: Lanet, J.-L., Toma, C. (eds.) SECITC 2018. LNCS, vol. 11359, pp. 234\u2013246. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12942-2_18"},{"doi-asserted-by":"publisher","unstructured":"Rogova, G.L., Ilin, R.: Reasoning and decision making under uncertainty and risk for situation management. In: 2019 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), pp. 34\u201342 (2019). https:\/\/doi.org\/10.1109\/COGSIMA.2019.8724330","key":"26_CR25","DOI":"10.1109\/COGSIMA.2019.8724330"},{"doi-asserted-by":"crossref","unstructured":"Sahu, A., Mao, Z., Davis, K., Goulart, A.E.: Data processing and model selection for machine learning-based network intrusion detection. In: 2020 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR), pp. 1\u20136 (2020)","key":"26_CR26","DOI":"10.1109\/CQR47547.2020.9101394"},{"key":"26_CR27","volume-title":"Threat Modeling: Designing for Security","author":"A Shostack","year":"2014","unstructured":"Shostack, A.: Threat Modeling: Designing for Security. John Wiley and Sons Inc, BoulevardIndianapolis (2014)"},{"doi-asserted-by":"publisher","unstructured":"The European Union Agency for Network and Information Security (ENISA): smart hospitals, security and resilience for smart health service and infrastructure, November 2016. https:\/\/doi.org\/10.2824\/28801","key":"26_CR28","DOI":"10.2824\/28801"},{"doi-asserted-by":"publisher","unstructured":"Tian, W., et al: Prospect theoretic study of honeypot defense against advanced persistent threats in power grid. IEEE Access, pp. 1\u20131 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2984795","key":"26_CR29","DOI":"10.1109\/ACCESS.2020.2984795"},{"unstructured":"TrapX Labs - A Division of TrapX Security Inc: ANATOMY OF AN ATTACK: MEDJACK (Medical Device Hijack). https:\/\/trapx.com\/trapx-labs-report-anatomy-of-attack-medical-device-hijack-medjack\/ (2015). Accessed 29 April 2020","key":"26_CR30"},{"unstructured":"U.S Food and Drug Administration: MAUDE Adverse Event Report: GE HEALTHCARE MACLAB. https:\/\/www.accessdata.fda.gov\/scripts\/cdrh\/cfdocs\/cfMAUDE\/Detail.CFM?MDRFOI__ID=3239402 (2013). Accessed 21 May 2020","key":"26_CR31"},{"unstructured":"U.S Food and Drug Administration: MAUDE Adverse Event Report: MERGE HEALTHCARE MERGE HEMO PROGRAMMABLE DIAGNOSTIC COMPUTER. https:\/\/www.accessdata.fda.gov\/scripts\/cdrh\/cfdocs\/cfmaude\/detail.cfm?mdrfoi__id=5487204 (2016). Accessed 21 May 2020","key":"26_CR32"},{"unstructured":"U.S Food and Drug Administration: Postmarket Management of Cybersecurity in Medical Devices. https:\/\/www.fda.gov\/media\/95862\/download (2016). Accessed 15 May 2020","key":"26_CR33"},{"unstructured":"U.S Food and Drug Administration: Department of health and human services, Medical Devices, Part 820, Quality System Regulation. https:\/\/www.accessdata.fda.gov\/scripts\/cdrh\/cfdocs\/cfcfr\/CFRSearch.cfm?CFRPart=820&showFR=1&subpartNode=21:8.0.1.1.12.3 (2019). Accessed 21 May 2020","key":"26_CR34"},{"unstructured":"Vectra: 2019 Spotlight Report: Healthcare\u2019s legacy infrastructure of unmanaged devices exposes a vulnerable attack surface. https:\/\/www.vectra.ai\/download\/spotlight-report-on-healthcare-2019#form-download (2019). Accessed 16 May 2020","key":"26_CR35"},{"doi-asserted-by":"publisher","unstructured":"Vetterl, A., Clayton, R.: Honware: a virtual honeypot framework for capturing CPE and IoT zero days. In: 2019 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201313, November 2019. https:\/\/doi.org\/10.1109\/eCrime47957.2019.9037501","key":"26_CR36","DOI":"10.1109\/eCrime47957.2019.9037501"},{"doi-asserted-by":"publisher","unstructured":"Wafi, H., Fiade, A., Hakiem, N., Bahaweres, R.B.: Implementation of a modern security systems honeypot honey network on wireless networks. In: 2017 International Young Engineers Forum (YEF-ECE), pp. 91\u201396, May 2017. https:\/\/doi.org\/10.1109\/YEF-ECE.2017.7935647","key":"26_CR37","DOI":"10.1109\/YEF-ECE.2017.7935647"},{"doi-asserted-by":"publisher","unstructured":"Wang, H., Wu, B.: SDN-based hybrid honeypot for attack capture. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 1602\u20131606, March 2019. https:\/\/doi.org\/10.1109\/ITNEC.2019.8729425","key":"26_CR38","DOI":"10.1109\/ITNEC.2019.8729425"},{"doi-asserted-by":"crossref","unstructured":"Xu, Y., Tran, D., Tian, Y., Alemzadeh, H.: Poster abstract: analysis of cyber-security vulnerabilities of interconnected medical devices. In: 2019 IEEE\/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), pp. 23\u201324 (2019)","key":"26_CR39","DOI":"10.1109\/CHASE48038.2019.00017"},{"issue":"4","key":"26_CR40","doi-asserted-by":"publisher","first-page":"3723","DOI":"10.1109\/COMST.2019.2914094","volume":"21","author":"T Yaqoob","year":"2019","unstructured":"Yaqoob, T., Abbas, H., Atiquzzaman, M.: Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices\u2013a review. IEEE Commun. Surv. Tutorials 21(4), 3723\u20133768 (2019). https:\/\/doi.org\/10.1109\/COMST.2019.2914094","journal-title":"IEEE Commun. Surv. Tutorials"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65726-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:58:14Z","timestamp":1709834294000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-65726-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030657253","9783030657260"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65726-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NEW2AN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Next Generation Wired\/Wireless Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"new2an2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.new2an.org\/#\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"225","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"74","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}