{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:34:45Z","timestamp":1742996085374,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319644820"},{"type":"electronic","value":"9783319644837"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64483-7_9","type":"book-chapter","created":{"date-parts":[[2017,7,26]],"date-time":"2017-07-26T13:19:07Z","timestamp":1501075147000},"page":"130-144","source":"Crossref","is-referenced-by-count":1,"title":["Modeling Malware-driven Honeypots"],"prefix":"10.1007","author":[{"given":"Gerardo","family":"Fernandez","sequence":"first","affiliation":[]},{"given":"Ana","family":"Nieto","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,27]]},"reference":[{"key":"9_CR1","unstructured":"Internet security threat report: vol. 21, Symantec, Technical report, 2016, April 2016"},{"key":"9_CR2","unstructured":"SentinelOne: Sentinelone ransomware research data summary (2017). https:\/\/go.sentinelone.com\/rs\/327-MNM-087\/images\/Data%20Summary%20-%20English.pdf"},{"key":"9_CR3","unstructured":"Cymmetria: Mirai open source iot honeypot (2016). http:\/\/blog.cymmetria.com\/mirai-open-source-iot-honeypot-new-cymmetria-research-release"},{"key":"9_CR4","unstructured":"Nawrocki, M., W\u00e4hlisch, M., Schmidt, T.C.: A Survey on Honeypot Software and Data Analysis. arXiv.org , vol. 10, pp. 63\u201375 (2016)"},{"issue":"3","key":"9_CR5","first-page":"522","volume":"24","author":"YMP Pa","year":"2016","unstructured":"Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT - a novel honeypot for revealing current IoT threats. JIP 24(3), 522\u2013533 (2016)","journal-title":"JIP"},{"key":"9_CR6","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-642-54525-2_29","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"A Pauna","year":"2014","unstructured":"Pauna, A., Patriciu, V.V.: CASSHH \u2013 case adaptive SSH honeypot. In: Mart\u00ednez P\u00e9rez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol. 420, pp. 322\u2013333. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-54525-2_29"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Wagener, G., State, R., Engel, T.: Adaptive and self-configurable honeypots. In: Integrated Network Management (IM) (2011)","DOI":"10.1109\/INM.2011.5990710"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Guarnizo, J., Tambe, A.. Bhunia, S.S., Ochoa, M., Tippenhauer, N.O., Shabtai, A., Elovici, Y.: SIPHON - Towards Scalable High-Interaction Physical Honeypots. CoRR, vol. cs.CR (2017)","DOI":"10.1145\/3055186.3055192"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-25744-0_1","volume-title":"Mobile, Secure, and Programmable Networking","author":"W Fan","year":"2015","unstructured":"Fan, W., Fern\u00e1ndez, D., Du, Z.: Adaptive and flexible virtual honeynet. In: Boumerdassi, S., Bouzefrane, S., Renault, \u00c9. (eds.) MSPN 2015. LNCS, vol. 9395, pp. 1\u201317. Springer, Cham (2015). doi: 10.1007\/978-3-319-25744-0_1"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Wagner, C., Dulaunoy, A., Wagener, G., Iklody, A.: Misp: the design and implementation of a collaborative threat intelligence sharing platform. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, pp. 49\u201356. ACM (2016)","DOI":"10.1145\/2994539.2994542"},{"key":"9_CR11","unstructured":"G. Inc.: Virus total intelligence (2017). https:\/\/www.virustotal.com"},{"key":"9_CR12","unstructured":"Porcello, J.: Navigating and Visualizing the Malware Intelligence Space, pp. 1\u20137, November 2012"},{"key":"9_CR13","unstructured":"Hungenberg, T., Eckert, M.: Internet services simulation suite (2014). http:\/\/www.inetsim.org"},{"key":"9_CR14","unstructured":"Guarnieri, C., Tanasi, A., Bremer, J., Schloesser, M.: The cuckoo sandbox (2012)"},{"key":"9_CR15","unstructured":"Angrishi, K.: Turning internet of things (IoT) into internet of vulnerabilities (IoV): Iot botnets, February 2017"},{"key":"9_CR16","unstructured":"Bellard, F.: Qemu, a fast and portable dynamic translator. In: USENIX Annual Technical Conference, FREENIX Track, pp. 41\u201346 (2005)"},{"key":"9_CR17","unstructured":"Critical Stack Inc.: Critical stack intel \/\/ feed (2017). https:\/\/intel.criticalstack.com"},{"key":"9_CR18","unstructured":"Payload Security.: Free automated malware analysis service (2017). https:\/\/www.hybrid-analysis.com"},{"key":"9_CR19","unstructured":"Ramilli, M.: A machine learning dataset for everyone (2016). http:\/\/marcoramilli.blogspot.com.es\/2016\/12\/malware-training-sets-machine-learning.html"},{"key":"9_CR20","unstructured":"Trinius, P., Willems, C., Holz, T., Rieck, K.: A Malware Instruction Set for Behavior-Based Analysis. Sicherheit (2010)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64483-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T13:02:20Z","timestamp":1569934940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64483-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319644820","9783319644837"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64483-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}