{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:28:42Z","timestamp":1742923722676,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319257433"},{"type":"electronic","value":"9783319257440"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25744-0_1","type":"book-chapter","created":{"date-parts":[[2015,11,29]],"date-time":"2015-11-29T07:46:38Z","timestamp":1448783198000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Adaptive and Flexible Virtual Honeynet"],"prefix":"10.1007","author":[{"given":"Wenjun","family":"Fan","sequence":"first","affiliation":[]},{"given":"David","family":"Fern\u00e1ndez","sequence":"additional","affiliation":[]},{"given":"Zhihui","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"1_CR1","unstructured":"Spitzner, L.: The Value of Honeypots, Part One: Definitions and Values of Honeypots, 10 Oct 2001. \n                    http:\/\/www.symantec.com\/connect\/articles\/value-honeypots-part-one-definitions-and-values-honeypots"},{"key":"1_CR2","unstructured":"Provos, N.: A virtual honeypot framework. In: SSYM 2004 Proceedings of the 13th Conference on USENIX Security Symposium, vol. 13 (2004)"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Hecker, C., Hay, B.: Automated honeynet deployment for dynamic network environment. In: 2013 46th Hawaii International Conference on System Sciences (HICSS), pp. 4880\u20134889, 7\u201310 Jan 2013","DOI":"10.1109\/HICSS.2013.110"},{"key":"1_CR4","unstructured":"Fu, X., Bryan, G., Cheng, D., Bettati, R., Zhao, W.: Camouflaging virtual honeypots. In: Texas A&M University (2005)"},{"key":"1_CR5","first-page":"692","volume":"7","author":"H Wang","year":"2012","unstructured":"Wang, H., Chen, Q.: Dynamic deploying distributed low-interaction honeynet. J. Comput. N. Am. 7, 692\u2013698 (2012)","journal-title":"J. Comput. N. Am."},{"key":"1_CR6","unstructured":"Yan, L.K.: Virtual honeynets revisited. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, IAW 2005. pp. 232\u2013239, 15\u201317 June 2005"},{"key":"1_CR7","unstructured":"Gal\u00e1n, F., Fern\u00e1ndez, D.: Use of VNUML in Virtual Honeynets Deployment. IX Reuni\u00f3n Espa\u00f1ola sobre Criptolog\u00eda y Seguridad de la Informaci\u00f3n (RECSI), Barcelona (Spain), September 2006. ISBN: 84-9788-502-3"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Abbasi, F.H., Harris, R.J.: Experiences with a generation III virtual honeynet. In: 2009 Australasian, Telecommunication Networks and Applications Conference (ATNAC), pp. 1\u20136, 10\u201312 Nov 2009","DOI":"10.1109\/ATNAC.2009.5464785"},{"key":"1_CR9","unstructured":"Honeynet Project. Know Your Enemy: Sebek, A kernel based data capture tool, 17 November 2003. \n                    http:\/\/old.honeynet.org\/papers\/sebek.pdf"},{"key":"1_CR10","volume-title":"The Cuckoo\u2019s Egg: Tracking a Spy Through the Maze of Computer Espionage","author":"C Stoll","year":"1990","unstructured":"Stoll, C.: The Cuckoo\u2019s Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket, New York (1990)"},{"key":"1_CR11","unstructured":"Spitzner, L.: Honeytokens: The Other Honeypot, 17 July 2003. \n                    http:\/\/www.symantec.com\/connect\/articles\/honeytokens-other-honeypot"},{"key":"1_CR12","volume-title":"Virtual Honeypots: From Botnet Tracking to Intrusion Detection","author":"N Provos","year":"2007","unstructured":"Provos, N., Holz, T.: Virtual Honeypots: From Botnet Tracking to Intrusion Detection, 1st edn. Addison-Wesley Professional, Boston (2007)","edition":"1"},{"key":"1_CR13","unstructured":"Honeynet Project. Know Your Enemy: Honeynets, 26 April 2001. \n                    http:\/\/www.symantec.com\/connect\/articles\/know-your-enemy-honeynets"},{"key":"1_CR14","unstructured":"Stumpf, F., G\u00f6rlach, A., Homann, F., Bruuckner, L.: NoSE - building virtual honeynets made easy. In: Proceedings of the 12th International Linux System Technology Conference, Hamburg, Germany (2005)"},{"key":"1_CR15","unstructured":"Honeynet Project. Know Your Tools: Qebek \u2013 Conceal the Monitoring, 03 Nov 2010. \n                    http:\/\/www.honeynet.org\/papers\/KYT_qebek"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Fernandez, D., Cordero, A., Somavilla, J., Rodriguez, J., Corchero, A., Tarrafeta, L., Galan, F.: Distributed virtual scenarios over multi-host Linux environments. In: 5th International DMTF Academic Alliance Workshop on Systems and Virtualization Management (SVM), pp. 1\u20138, 24 Oct 2011","DOI":"10.1109\/SVM.2011.6096467"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-642-25141-2_7","volume-title":"Advances in Information and Computer Security","author":"J Pfoh","year":"2011","unstructured":"Pfoh, J., Schneider, C., Eckert, C.: Nitro: hardware-based system call tracing for virtual machines. In: Iwata, T., Nishigaki, M. (eds.) IWSEC 2011. LNCS, vol. 7038, pp. 96\u2013112. Springer, Heidelberg (2011)"},{"key":"1_CR18","unstructured":"Berthier, R., Cukier, M.: Honeybrid: a hybrid honeypot architecture. In: USENIX Security Symposium 2008 (2008)"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-540-74320-0_11","volume-title":"Recent Advances in Intrusion Detection","author":"X Jiang","year":"2007","unstructured":"Jiang, X., Wang, X.: \u201cOut-of-the-box\u201d monitoring of VM-based high-interaction honeypots. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 198\u2013218. Springer, Heidelberg (2007)"},{"key":"1_CR20","unstructured":"Honeynet Project. Know Your Enemy: Defining Virtual Honeynets, 27 January 2001. \n                    http:\/\/old.honeynet.org\/papers\/virtual\/"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Capalik, A.: Next-generation honeynet technology with real-time forensics for U.S. defense. In:\u00a0Military Communications Conference, MILCOM 2007, pp. 1\u20137. IEEE, 29\u201331 Oct 2007","DOI":"10.1109\/MILCOM.2007.4455171"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Memari, N., Hashim, S.J.B., Samsudin, K.B.: Towards virtual honeynet based on LXC virtualization. In: 2014 IEEE Region 10 Symposium, pp. 496\u2013 501, 14\u201316 April 2014","DOI":"10.1109\/TENCONSpring.2014.6863084"}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25744-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T14:51:11Z","timestamp":1559314271000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25744-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319257433","9783319257440"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25744-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"25 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}