{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:48:00Z","timestamp":1767138480287,"version":"build-2238731810"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662447871","type":"print"},{"value":"9783662447888","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44788-8_15","type":"book-chapter","created":{"date-parts":[[2014,9,27]],"date-time":"2014-09-27T01:09:51Z","timestamp":1411780191000},"page":"252-269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["IPv6 Network Attack Detection with HoneydV6"],"prefix":"10.1007","author":[{"given":"Sven","family":"Schindler","sequence":"first","affiliation":[]},{"given":"Bettina","family":"Schnor","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Kiertscher","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Scheffler","sequence":"additional","affiliation":[]},{"given":"Eldad","family":"Zack","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,28]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Ford, M., Stevens, J., Ronan, J.: Initial results from an IPv6 darknet. In: ICISP \u201906: Proceedings of the International Conference on Internet Surveillance and Protection, Washington, DC, USA, p. 13. IEEE Computer Society (2006)","DOI":"10.1109\/ICISP.2006.14"},{"key":"15_CR2","unstructured":"Heuse, M.: THC IPv6 attack tool kit. http:\/\/www.thc.org\/thc-ipv6\/"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Thomson, S., Narten, T., Jinmei, T.: IPv6 Stateless Address Autoconfiguration. RFC 4862, September 2007","DOI":"10.17487\/rfc4862"},{"key":"15_CR4","unstructured":"Seifert, C., Welch, I., Komisarczuk, P.: Taxonomy of honeypots. Technical report, Victoria University of Wellington, Wellington (2006)"},{"key":"15_CR5","unstructured":"Provos, N.: Honeyd: A virtual honeypot daemon. Technical report, Center for Information Technology Integration, University of Michigan, February 2003"},{"key":"15_CR6","unstructured":"ENISA Honeypot Study - Proactive Detection of Security Incidents\u00a0(2012).\u00a0http:\/\/www.enisa.europa.eu\/activities\/cert\/support\/proactive-detection\/proactive-detection-of-security-incidents-II-honeypots"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Pang, R., Yegneswaran, V., Barford, P., Paxson, V., Peterson, L.: Characteristics of internet background radiation. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, IMC \u201904, pp. 27\u201340. ACM, New York (2004)","DOI":"10.1145\/1028788.1028794"},{"key":"15_CR8","unstructured":"Huston, G.: Background Radiation in IPv6, October 2010. https:\/\/labs.ripe.net\/Members\/mirjam\/background-radiation-in-ipv6"},{"key":"15_CR9","unstructured":"Johns, M.S.: Identification Protocol. RFC 1413 (Proposed Standard) February 1993"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Kalt, C.: Internet Relay Chat: Architecture. RFC 2810 (Informational) April 2000","DOI":"10.17487\/rfc2810"},{"key":"15_CR11","unstructured":"Dionaea: dionaea catches bugs. http:\/\/dionaea.carnivore.it\/"},{"key":"15_CR12","unstructured":"Baecher, P., Koetter, M.: libemu - x86 Shellcode Emulation. http:\/\/libemu.carnivore.it\/"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Vrable, M., Ma, J., Chen, J., Moore, D., Vandekieft, E., Snoeren, A.C., Voelker, G.M., Savage, S.: Scalability, fidelity, and containment in the potemkin virtual honeyfarm. In: Proceedings of the Twentieth ACM Symposium on Operating Systems Principles, SOSP \u201905, pp. 148\u2013162. ACM, New York (2005)","DOI":"10.1145\/1095809.1095825"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Clemente, P., Lalande, J.F., Rouzaud-Cornabas, J.: HoneyCloud: elastic honeypots - on-attack provisioning of high-interaction honeypots. In: International Conference on Security and Cryptography, Rome, Italy, July 2012, pp. 434\u2013439 (2012)","DOI":"10.5220\/0004129604340439"},{"issue":"3","key":"15_CR15","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1145\/3828.3835","volume":"32","author":"DD Sleator","year":"1985","unstructured":"Sleator, D.D., Tarjan, R.E.: Self-adjusting binary search trees. J. ACM 32(3), 652\u2013686 (1985)","journal-title":"J. ACM"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Chown, T.: IPv6 Implications for Network Scanning. RFC 5157 (Informational) March 2008","DOI":"10.17487\/rfc5157"},{"key":"15_CR17","unstructured":"SI6 Networks: SI6 Networks\u2019 IPv6 Toolkit - A security assessment and troubleshooting tool for the IPv6 protocols (2012). http:\/\/www.si6networks.com\/tools\/ipv6toolkit"},{"key":"15_CR18","volume-title":"Virtual Honeypots - From Botnet Tracking to Intrusion Detection","author":"N Provos","year":"2008","unstructured":"Provos, N., Holz, T.: Virtual Honeypots - From Botnet Tracking to Intrusion Detection. Addison-Wesley, Boston (2008)"},{"key":"15_CR19","unstructured":"Zinke, J., Habenschu\u00df, J., Schnor, B.: Servload: generating representative workloads for web server benchmarking. In: International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECT), Genoa (2012)"},{"key":"15_CR20","unstructured":"Nmap: Nmap Network Scanning - IPv6 fingerprinting. http:\/\/nmap.org\/book\/osdetect-ipv6-methods.html"}],"container-title":["Communications in Computer and Information Science","E-Business and Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44788-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T17:52:50Z","timestamp":1746381170000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-44788-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662447871","9783662447888"],"references-count":20,"aliases":["10.1007\/978-3-662-45945-4_15"],"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44788-8_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"28 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}