{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:15:00Z","timestamp":1775470500365,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,8,6]],"date-time":"2022-08-06T00:00:00Z","timestamp":1659744000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,6]],"date-time":"2022-08-06T00:00:00Z","timestamp":1659744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10207-022-00605-7","type":"journal-article","created":{"date-parts":[[2022,8,6]],"date-time":"2022-08-06T17:03:50Z","timestamp":1659805430000},"page":"1211-1222","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A decentralized honeypot for IoT Protocols based on Android devices"],"prefix":"10.1007","volume":"21","author":[{"given":"Irini","family":"Lygerou","sequence":"first","affiliation":[]},{"given":"Shreyas","family":"Srinivasa","sequence":"additional","affiliation":[]},{"given":"Emmanouil","family":"Vasilomanolakis","sequence":"additional","affiliation":[]},{"given":"George","family":"Stergiopoulos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7793-6128","authenticated-orcid":false,"given":"Dimitris","family":"Gritzalis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,6]]},"reference":[{"key":"605_CR1","doi-asserted-by":"crossref","unstructured":"Abomhara, M., K\u00f8ien, G.\u00a0M.: \u201cCyber security and the internet of things: vulnerabilities, threats, intruders and attacks,\u201d Journal of Cyber Security and Mobility, 65\u201388, (2015)","DOI":"10.13052\/jcsm2245-1439.414"},{"key":"605_CR2","unstructured":"AbuseIPDB. Abuseipdb. [Online]. Available: https:\/\/www.abuseipdb.com\/check\/218.92.0.189 (2020)"},{"key":"605_CR3","unstructured":"Adkins, P.: Kako honeypot. [Online]. Available: https:\/\/github.com\/darkarnium\/kako (2017)"},{"issue":"1","key":"605_CR4","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.kijoms.2017.02.004","volume":"3","author":"HM Ahmed","year":"2017","unstructured":"Ahmed, H.M., Hassan, N.F., Fahad, A.A.: Designing a smartphone honeypot system using performance counters. Karbala International Journal of Modern Science 3(1), 46\u201352 (2017)","journal-title":"Karbala International Journal of Modern Science"},{"key":"605_CR5","doi-asserted-by":"crossref","unstructured":"Alriksson.: Critical internet of things (iot) connectivity is ideal for a wide range of time-critical use cases across most industry verticals, and mobile network operators are uniquely positioned to deliver it (2020)","DOI":"10.23919\/ETR.2020.9905508"},{"key":"605_CR6","doi-asserted-by":"crossref","unstructured":"Andrews, R., Hahn, D.\u00a0A., Bardas, A.\u00a0G.: \u201cMeasuring the prevalence of the password authentication vulnerability in ssh,\u201d in ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 1\u20137 (2020)","DOI":"10.1109\/ICC40277.2020.9148912"},{"key":"605_CR7","doi-asserted-by":"crossref","unstructured":"Bansal, M, et\u00a0al.: \u201cPerformance comparison of mqtt and coap protocols in different simulation environments,\u201d Inventive Communication and Computational Technologies, 549\u2013560, (2021)","DOI":"10.1007\/978-981-15-7345-3_47"},{"key":"605_CR8","doi-asserted-by":"crossref","unstructured":"Bernieri, G., Conti, M., Pascucci, F.: \u201cMimepot: A model-based honeypot for industrial control networks,\u201d in,: ieee international conference on systems, man and cybernetics (smc). IEEE 2019, 433\u2013438 (2019)","DOI":"10.1109\/SMC.2019.8913891"},{"key":"605_CR9","unstructured":"Bevywise.: An exhaustive iot simulator for iot\/mqtt application testing. [Online]. Available: https:\/\/www.bevywise.com\/iot-simulator\/ (2022)"},{"key":"605_CR10","unstructured":"Blackhat.: Black hat directory. [Online]. Available: https:\/\/blackhat.directory\/ip\/171.240.199.80 (2020)"},{"key":"605_CR11","unstructured":"Bosch-s.: Mqtt simulator. [Online]. Available: http:\/\/documentation.bosch-si.com\/iot\/RM\/v7\/en\/101937.htm (2022)"},{"key":"605_CR12","doi-asserted-by":"crossref","unstructured":"Buza, D.\u00a0I., Juh\u00e1sz, F., Miru, G., F\u00e9legyh\u00e1zi, M., Holczer, T.:\u201cCryplh: Protecting smart energy systems from targeted attacks with a plc honeypot,\u201d in International Workshop on Smart Grid Security. Springer, 181\u2013192 (2014)","DOI":"10.1007\/978-3-319-10329-7_12"},{"key":"605_CR13","unstructured":"Cimpanu, C.: The coap protocol is the next big thing for ddos attacks. [Online]. Available: https:\/\/www.zdnet.com\/article\/the-coap-protocol-is-the-next-big-thing-for-ddos-attacks\/ (2020)"},{"key":"605_CR14","unstructured":"Cimpanu, C.: Hacker leaks passwords for more than 500,000 servers, routers, and iot devices. [Online]. Available: https:\/\/www.zdnet.com\/article\/hacker-leaks-passwords-for-more-than-500000-servers-routers-and-iot-devices\/ (2020)"},{"key":"605_CR15","unstructured":"CloudAMQP. Amqp. [Online]. Available: https:\/\/www.cloudamqp.com\/docs\/amqp.html (2020)"},{"key":"605_CR16","unstructured":"Communications, G.: Mimic mqtt simulator - for iot simulation. [Online]. Available: https:\/\/www.gambitcomm.com\/site\/mqttsimulator.php (2022)"},{"key":"605_CR17","unstructured":"Demeter, D., Preuss, M., Shmelev, Y.: Iot: a malware story. [Online]. Available: https:\/\/securelist.com\/iot-a-malware-story\/94451\/ (2019)"},{"key":"605_CR18","unstructured":"ENISA.: Enisa threat landscape 2020 - botnet. [Online]. Available: https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2020-botnet (2020)"},{"issue":"9","key":"605_CR19","first-page":"4512","volume":"12","author":"O Erdem","year":"2018","unstructured":"Erdem, O., Pektas, A., Kara, M.: Honeything: A new honeypot design for cpe devices. KSII Transactions on Internet and Information Systems (TIIS) 12(9), 4512\u20134526 (2018)","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"key":"605_CR20","unstructured":"Ericsson, A.: \u201cCellular networks for massive iot\u2013enabling low power wide area applications,\u201d no. January, pp. 1\u201313, (2016)"},{"key":"605_CR21","unstructured":"Franik, M. C.: Serious flaws found in multiple smart home hubs: Is your device among them? [Online]. Available: https:\/\/www.welivesecurity.com\/2020\/04\/22\/serious-flaws-smart-home-hubs-is-your-device-among-them\/ (2020)"},{"key":"605_CR22","unstructured":"GreenDAO.: greeendao. [Online]. Available: https:\/\/greenrobot.org\/greendao\/ (2021)"},{"key":"605_CR23","doi-asserted-by":"crossref","unstructured":"Hakim, M.\u00a0A., Aksu, H., Uluagac, A.\u00a0S., Akkaya, K.: \u201cU-pot: A honeypot framework for upnp-based iot devices,\u201d in 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC).IEEE, 1\u20138 (2018)","DOI":"10.1109\/PCCC.2018.8711321"},{"key":"605_CR24","unstructured":"Higgins, A.: \u201cAdaptive containerised honeypots for cyber-incident monitoring,\u201d Integrated Masters in Computer Engineering (MAI), (2018)"},{"key":"605_CR25","volume-title":"Caught in the act: Running a realistic factory honeypot to capture real threats","author":"S Hilt","year":"2020","unstructured":"Hilt, S., Maggi, F., Perine, C., Remorin, L., R\u00f6sler, M., Vosseler, R.: Caught in the act: Running a realistic factory honeypot to capture real threats. Trend Micro, Shibuya City, Japan, White Paper (2020)"},{"key":"605_CR26","unstructured":"Ho, C.\u00a0C., Ting, C.-Y.: \u201cA conceptual framework for smart mobile honeypots,\u201d Academia, http:\/\/www.academia.edu\/download\/31058450\/KasperskyConferen cecchocyting.Pdf, (2014)"},{"issue":"2","key":"605_CR27","first-page":"510","volume":"8","author":"SP Jaikar","year":"2018","unstructured":"Jaikar, S.P., Iyer, K.R.: A survey of messaging protocols for iot systems. International Journal of Advanced in Management, Technology and Engineering Sciences 8(2), 510\u2013514 (2018)","journal-title":"International Journal of Advanced in Management, Technology and Engineering Sciences"},{"key":"605_CR28","volume-title":"Energy-grid threat analysis using honeypots","author":"MM Kendrick","year":"2019","unstructured":"Kendrick, M.M., Rucker, Z.A.: Energy-grid threat analysis using honeypots. Tech. Rep, Naval Postgraduate School Monterey United States (2019)"},{"key":"605_CR29","unstructured":"Krishnaprasad, P.: \u201cCapturing attacks on iot devices with a multi-purpose iot honeypot,\u201d INDIAN INSTITUTE OF TECHNOLOGY KANPUR, (2017)"},{"issue":"5","key":"605_CR30","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/MIC.2016.103","volume":"20","author":"S Litchfield","year":"2016","unstructured":"Litchfield, S., Formby, D., Rogers, J., Meliopoulos, S., Beyah, R.: Rethinking the honeypot for cyber-physical systems. IEEE Internet Computing 20(5), 9\u201317 (2016)","journal-title":"IEEE Internet Computing"},{"key":"605_CR31","unstructured":"Luo, T., Xu, Z., Jin, X., Jia, Y., Ouyang, X.: \u201cIotcandyjar: Towards an intelligent-interaction honeypot for iot devices,\u201d Black Hat, 2017, (2017)"},{"key":"605_CR32","unstructured":"mqtt.org.: Mqtt: The standard for iot messaging. [Online]. Available: https:\/\/mqtt.org\/ (2021)"},{"issue":"3","key":"605_CR33","doi-asserted-by":"publisher","first-page":"522","DOI":"10.2197\/ipsjjip.24.522","volume":"24","author":"YMP Pa","year":"2016","unstructured":"Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: Iotpot: A novel honeypot for revealing current iot threats. Journal of Information Processing 24(3), 522\u2013533 (2016)","journal-title":"Journal of Information Processing"},{"key":"605_CR34","doi-asserted-by":"crossref","unstructured":"Pliatsios, D., Sarigiannidis, P., Liatifis, T., Rompolos, K., Siniosoglou, I.: \u201cA novel and interactive industrial control system honeypot for critical smart grid infrastructure,\u201d in,: IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE 2019, 1\u20136 (2019)","DOI":"10.1109\/CAMAD.2019.8858431"},{"key":"605_CR35","unstructured":"Qing, Z., Guangdong, B.: 3g\/4g intranet scanning and its application on the worm hole vulnerability (2017)"},{"key":"605_CR36","doi-asserted-by":"crossref","unstructured":"Safaei, B., Monazzah, A.\u00a0M.\u00a0H., Bafroei, M.\u00a0B., Ejlali, A.: \u201cReliability side-effects in internet of things application layer protocols,\u201d in 2017 2nd International Conference on System Reliability and Safety (ICSRS). IEEE, 207\u2013212 (2017)","DOI":"10.1109\/ICSRS.2017.8272822"},{"key":"605_CR37","unstructured":"Seals, T.: Fritzfrog botnet attacks millions of ssh servers. [Online]. Available: https:\/\/threatpost.com\/fritzfrog-botnet-millions-ssh-servers\/158489\/ (2020)"},{"key":"605_CR38","doi-asserted-by":"crossref","unstructured":"Sentanoe, S., Taubmann, B., Reiser, H.\u00a0P.: \u201cSarracenia: enhancing the performance and stealthiness of ssh honeypots using virtual machine introspection,\u201d in Nordic Conference on Secure IT Systems. Springer, 255\u2013271 (2018)","DOI":"10.1007\/978-3-030-03638-6_16"},{"key":"605_CR39","doi-asserted-by":"crossref","unstructured":"Srinivasa, S., Pedersen, J.\u00a0M., Vasilomanolakis, E.: \u201cOpen for hire: Attack trends and misconfiguration pitfalls of iot devices,\u201d in Proceedings of the 21st ACM Internet Measurement Conference, ser. IMC \u201921. New York, NY, USA: Association for Computing Machinery, 195-215. [Online]. Available: https:\/\/doi.org\/10.1145\/3487552.3487833 (2021)","DOI":"10.1145\/3487552.3487833"},{"key":"605_CR40","unstructured":"Srinivasa, S., Pedersen, J.\u00a0M., Vasilomanolakis, E.: \u201cRiotpot: a modular hybrid-interaction iot\/ot honeypot,\u201d in 26th European Symposium on Research in Computer Security (ESORICS) 2021. Springer, (2021)"},{"key":"605_CR41","unstructured":"SSH.: Ssh protocol. [Online]. Available: https:\/\/www.ssh.com\/ssh\/protocol\/ (2020)"},{"key":"605_CR42","unstructured":"Stahie, S.: ver 500,000 credentials for telnet exposed iot devices and servers leaked online. [Online]. Available: https:\/\/www.bitdefender.com\/box\/blog\/iot-news\/500000-credentials-telnet-exposed-iot-devices-servers-leaked-online\/ (2020)"},{"key":"605_CR43","unstructured":"Stahie, S.: Iot botnet attacks on the rise in 2020. [Online]. Available: https:\/\/www.bitdefender.com\/box\/blog\/iot-news\/iot-botnet-attacks-rise-2020\/ (2020)"},{"key":"605_CR44","unstructured":"Tabari, A.\u00a0Z., Ou, X.: \u201cA first step towards understanding real-world attacks on iot devices,\u201d arXiv preprint arXiv:2003.01218, (2020)"},{"issue":"10","key":"605_CR45","doi-asserted-by":"publisher","first-page":"2932","DOI":"10.3390\/s20102932","volume":"20","author":"I Vaccari","year":"2020","unstructured":"Vaccari, I., Aiello, M., Cambiaso, E.: Slowite, a novel denial of service attack affecting mqtt. Sensors 20(10), 2932 (2020)","journal-title":"Sensors"},{"key":"605_CR46","doi-asserted-by":"crossref","unstructured":"Vasilomanolakis, E., Karuppayah, S., M\u00fchlh\u00e4user, M., Fischer, M.: \u201cHostage: a mobile honeypot for collaborative defense,\u201d in Proceedings of the 7th International Conference on Security of Information and Networks,330\u2013333 (2014)","DOI":"10.1145\/2659651.2659663"},{"key":"605_CR47","doi-asserted-by":"crossref","unstructured":"Wang, B., Dou, Y., Sang, Y., Zhang, Y., Huang, J.: \u201cIotcmal: Towards a hybrid iot honeypot for capturing and analyzing malware,\u201d in ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 1\u20137 (2020)","DOI":"10.1109\/ICC40277.2020.9149314"},{"key":"605_CR48","doi-asserted-by":"crossref","unstructured":"Wang, H., He, H., Zhang, W., Liu, W., Liu, P., Javadpour, A.: Using honeypots to model botnet attacks on the internet of medical things. Computers and Electrical Engineering 102, 108212 (2022)","DOI":"10.1016\/j.compeleceng.2022.108212"},{"key":"605_CR49","unstructured":"Wang, M., Santillan, J., Kuipers, F.: \u201cThingpot: an interactive internet-of-things honeypot,\u201d arXiv preprint arXiv:1807.04114, (2018)"},{"key":"605_CR50","doi-asserted-by":"crossref","unstructured":"Xiao, F., Chen, E., Xu, Q.: \u201cS7commtrace: A high interactive honeypot for industrial control system based on s7 protocol,\u201d in International Conference on Information and Communications Security. Springer, 412\u2013423 (2017)","DOI":"10.1007\/978-3-319-89500-0_36"}],"updated-by":[{"DOI":"10.1007\/s10207-022-00628-0","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2022,10,29]],"date-time":"2022-10-29T00:00:00Z","timestamp":1667001600000}}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00605-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-022-00605-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00605-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T21:44:27Z","timestamp":1676324667000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-022-00605-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,6]]},"references-count":50,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["605"],"URL":"https:\/\/doi.org\/10.1007\/s10207-022-00605-7","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s10207-022-00628-0","asserted-by":"object"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,6]]},"assertion":[{"value":"6 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2022","order":2,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":4,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10207-022-00628-0","URL":"https:\/\/doi.org\/10.1007\/s10207-022-00628-0","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None of the authors have received any research grants. None of the authors have received a speaker honorarium from any company. All authors declare that none of them has any conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}