{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:50:54Z","timestamp":1743151854752,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811659423"},{"type":"electronic","value":"9789811659430"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-5943-0_18","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T23:04:08Z","timestamp":1631228648000},"page":"217-228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["IoT Honeypot Scanning and Detection System Based on Authorization Mechanism"],"prefix":"10.1007","author":[{"given":"Ning","family":"Li","sequence":"first","affiliation":[]},{"given":"Bo","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Ziyan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jinchao","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hanzhang","family":"Kong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"unstructured":"Statista Inc.: Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions) [EB\/OL] [2017-05-30]. https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/","key":"18_CR1"},{"unstructured":"Antonakakis, M., et al.: Understanding the Mirai Botnet. In: Proceedings of the USENIX Security Symposium, pp. 4\u201318, August 2017","key":"18_CR2"},{"doi-asserted-by":"crossref","unstructured":"Xu, Y., Koide, H., Vargas, D.V., et al.: Tracing MIRAI Malware in Networked System. In: 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). IEEE Computer Society, pp. 18\u201334 (2018)","key":"18_CR3","DOI":"10.1109\/CANDARW.2018.00104"},{"doi-asserted-by":"crossref","unstructured":"Marzano, A., et al.: The Evolution of Bashlite and Mirai IoT Botnets. In: 2018 IEEE Symposium on Computers and Communications (ISCC). IEEE, pp. 20\u201324 (2018)","key":"18_CR4","DOI":"10.1109\/ISCC.2018.8538636"},{"issue":"7","key":"18_CR5","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., et al.: DDoS in the IoT: Mirai and other Botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"unstructured":"Goodman, M.: Hacking the Human Heart[EB\/OL]. [2017-04-24]. http:\/\/bigthink.com\/future-crimes\/hacking-the-human-heart","key":"18_CR6"},{"key":"18_CR7","volume-title":"Network Scanning Technology Reveals: Principle, Practice and Implementation of Network Scanner","author":"L Ruimin","year":"2012","unstructured":"Ruimin, L.: Network Scanning Technology Reveals: Principle, Practice and Implementation of Network Scanner. Mechanical Industry Press, Beijing (2012)"},{"issue":"11","key":"18_CR8","first-page":"134","volume":"9","author":"C Nanping","year":"2010","unstructured":"Nanping, C.: Network scanner and the design principle of the model study. Softw. Guide J. 9(11), 134\u2013136 (2010)","journal-title":"Softw. Guide J."},{"doi-asserted-by":"crossref","unstructured":"Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. In: Proceedings of 2005 IEEE Symposium on Security and Privacy. IEEE, pp. 211\u2013225 (2005)","key":"18_CR9","DOI":"10.1109\/SP.2005.18"},{"issue":"5","key":"18_CR10","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/TDSC.2013.26","volume":"11","author":"L Polcak","year":"2014","unstructured":"Polcak, L., Jirasek, J., Matousek, P.: Comment on \u201cremote physical device fingerprinting.\u201d IEEE Trans. Depend. Secure Comput. 11(5), 494\u2013496 (2014)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-31966-5_4","volume":"3431","author":"AW Moore","year":"2005","unstructured":"Moore, A.W., Papagiannaki, K.: Toward the accurate identification of network applications. Lect. Notes Comput. Sci. 3431, 41\u201354 (2005)","journal-title":"Lect. Notes Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Haffner, P., et al.: ACAS: automated construction of application signatures. In: Proceedings of ACM Workshop on Mining Network Data, Minenet 2005. Philadelphia, USA. ACM, pp. 197\u2013202 (2005)","key":"18_CR12","DOI":"10.1145\/1080173.1080183"},{"issue":"5","key":"18_CR13","first-page":"537","volume":"38","author":"L Yi","year":"2018","unstructured":"Yi, L., Tian, S., Lejian, L.: A real-time mobile traffic classification approach based on timing sequence flow. Trans. Beijing Inst. Technol. 38(5), 537\u2013544 (2018)","journal-title":"Trans. Beijing Inst. Technol."},{"doi-asserted-by":"crossref","unstructured":"Roughan, M., et al.: Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement. ACM, pp. 135\u2013148 (2004)","key":"18_CR14","DOI":"10.1145\/1028788.1028805"},{"issue":"7","key":"18_CR15","first-page":"112","volume":"22","author":"R Beyah","year":"2015","unstructured":"Beyah, R., et al.: GTID: a technique for physical device and device type fingerprinting. IEEE Trans. Depend. Secure Comput. 22(7), 112\u2013120 (2015)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"doi-asserted-by":"crossref","unstructured":"Miettinen, M., et al.: IoT sentinel demo: automated device-type identification for security enforcement in IoT. In: Proceedings of International Conference on Distributed Computing Systems. IEEE, pp. 2177\u20132184 (2017)","key":"18_CR16","DOI":"10.1109\/ICDCS.2017.284"},{"issue":"62","key":"18_CR17","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.bjp.2013.10.014","volume":"62","author":"K Giotis","year":"2014","unstructured":"Giotis, K., et al.: Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput. Netw. 62(62), 122\u2013136 (2014)","journal-title":"Comput. Netw."},{"doi-asserted-by":"crossref","unstructured":"Mousavi, S.M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: Proceedings of 2015 International Conference on Computing, Networking and Communications (ICNC). IEEE (2015)","key":"18_CR18","DOI":"10.1109\/ICCNC.2015.7069319"},{"doi-asserted-by":"crossref","unstructured":"Conti, M., Gangwal, A., Gaur, M.S.: A comprehensive and effective mechanism for DDoS detection in SDN. In: Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. IEEE (2017)","key":"18_CR19","DOI":"10.1109\/WiMOB.2017.8115796"},{"issue":"4","key":"18_CR20","first-page":"850","volume":"99","author":"W Xiulei","year":"2016","unstructured":"Xiulei, W., et al.: Defending DDoS attacks in software-defined networking based on legitimate source and destination IP address database. IEICE Trans. Inf. Syst. 99(4), 850\u2013859 (2016)","journal-title":"IEICE Trans. Inf. Syst."},{"doi-asserted-by":"crossref","unstructured":"Poeplau, S., Gassen, J.: A honeypot for arbitrary malware on usb storage devices. In: 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS\u201912), pp. 1\u20138 (2012)","key":"18_CR21","DOI":"10.1109\/CRISIS.2012.6378948"},{"issue":"3","key":"18_CR22","first-page":"1","volume":"4","author":"A Podhradsky","year":"2012","unstructured":"Podhradsky, A., Casey, C., Ceretti, P.: The bluetooth honeypot project: measuring and managing bluetooth risks in the workplace. Int. J. Interdisciplinary Telecommun. Network. 4(3), 1\u201322 (2012)","journal-title":"Int. J. Interdisciplinary Telecommun. Network."},{"doi-asserted-by":"crossref","unstructured":"Dowling, S., Schukat, M., Melvin, H.: A ZigBee honeypot to assess IoT cyberattack behavior. In: 28th Irish Signals and Systems Conference (ISSC\u201917), pp. 1\u20136 (2017)","key":"18_CR23","DOI":"10.1109\/ISSC.2017.7983603"},{"unstructured":"Kara, M., \u0130kinci, A.: HoneyThing: Nesnelerin\u0130nterneti icin Tuzak Sistem. In: 8th International Conference on Information Security and Cryptology (ISCTurkey\u201915), pp. 258\u2013264 (2015)","key":"18_CR24"},{"key":"18_CR25","doi-asserted-by":"publisher","first-page":"169944","DOI":"10.1109\/ACCESS.2020.3023764","volume":"8","author":"SS Chakkaravarthy","year":"2020","unstructured":"Chakkaravarthy, S.S., et al.: Design of intrusion detection honeypot using social leopard algorithm to detect IoT ransomware attacks. IEEE Access 8, 169944\u2013169956 (2020)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Guarnizo, J.D., et al.: SIPHON: Towards scalable high-interaction physical honeypots. In: 3rd ACM Workshop on Cyber-Physical System Security (CPSS\u201917), pp. 456\u2013462 (2017)","key":"18_CR26","DOI":"10.1145\/3055186.3055192"},{"issue":"5","key":"18_CR27","doi-asserted-by":"publisher","first-page":"3991","DOI":"10.1109\/JIOT.2019.2956173","volume":"7","author":"W Zhang","year":"2019","unstructured":"Zhang, W., et al.: An IoT honeynet based on multiport honeypots for capturing IoT attacks. IEEE Internet Things J. 7(5), 3991\u20133999 (2019)","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"crossref","unstructured":"Saputro, E.D., Purwanto, Y., Ruriawan, M.F.: Medium interaction honeypot infrastructure on the internet of things. In: 2020 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS). IEEE, pp. 98\u2013102 (2021)","key":"18_CR28","DOI":"10.1109\/IoTaIS50849.2021.9359711"},{"doi-asserted-by":"crossref","unstructured":"Ziaie Tabari, A., Ou, X.: A multi-phased multi-faceted IoT honeypot ecosystem. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 2121\u20132123 (2020)","key":"18_CR29","DOI":"10.1145\/3372297.3420023"},{"doi-asserted-by":"crossref","unstructured":"Sedlar, U., Ju\u017eni\u010d, L.\u0160., Volk, M.: An iteratively-improving internet-of-things honeypot experiment. In: 2020 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom). IEEE, pp. 1\u20136 (2020)","key":"18_CR30","DOI":"10.1109\/CoBCom49975.2020.9174014"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-5943-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:51:44Z","timestamp":1710348704000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-5943-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811659423","9789811659430"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-5943-0_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiyuan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.icpcsee.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"256","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}