{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:05:27Z","timestamp":1767337527141,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319183015"},{"type":"electronic","value":"9783319183022"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18302-2_16","type":"book-chapter","created":{"date-parts":[[2015,5,30]],"date-time":"2015-05-30T12:55:57Z","timestamp":1432990557000},"page":"251-269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Specialized Honeypots for SCADA Systems"],"prefix":"10.1007","author":[{"given":"Paulo","family":"Sim\u00f5es","sequence":"first","affiliation":[]},{"given":"Tiago","family":"Cruz","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Proen\u00e7a","sequence":"additional","affiliation":[]},{"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,31]]},"reference":[{"key":"16_CR1","unstructured":"ANSI\/ISA-95.00.01 (2000) Enterprise-control system integration part 1: models and terminology, ISA 2000"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Baecher P, Koetter M, Holz T, Dornseif M, Freiling F (2006) The nepenthes platform: an efficient approach to collect malware. In: Recent advances in intrusion detection. Lecture Notes in Computer Science, vol 4219, pp 165\u2013184. Springer, Berlin","DOI":"10.1007\/11856214_9"},{"key":"16_CR3","unstructured":"Bos H (2009) Shelia: a client-side honeypot for attack detection. http:\/\/www.cs.vu.nl\/~herbertb\/misc\/shelia\/. Accessed 10 Sept 2013"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Case J, Fedor M, Schoffstall M, Davin J (1990) A simple network management protocol (SNMP), IETF RFC 1157, May 1990","DOI":"10.17487\/rfc1157"},{"key":"16_CR5","unstructured":"Cisco Critical Infrastructure Assurance Group\u2014CIAG (2004) SCADA HoneyNet Project, http:\/\/scadahoneynet.sourceforge.net\/. Accessed 10 Sept 2013"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Clarke G, Reynders D (2004) Practical modern SCADA protocols: DNP3, 60870.5 and related systems. IDC Technologies, Oxford","DOI":"10.1016\/B978-075065799-0\/50019-X"},{"key":"16_CR7","unstructured":"CockpitCI (2013) Cybersecurity on SCADA: risk prediction, analysis and reaction tools for critical infrastructures, FP7 SEC-285647 project website. http:\/\/www.CockpitCI.eu\/. Accessed 10 Sept 2013"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Creery A, Byres E (2005) Industrial cybersecurity for power system and SCADA networks. In: Industry applications society 52nd annual petroleum and chemical industry conference. IEEE, pp 303\u2013309","DOI":"10.1109\/PCICON.2005.1524567"},{"key":"16_CR19","doi-asserted-by":"publisher","unstructured":"Davis CM, Tate JE, Okhravi H, Grier C, Overbye, TJ, Nicol D (2006) SCADA cyber security testbed development. In: NAPS 2006. 38th North American power symposium. IEEE, pp 483\u2013488, doi:10.1109\/NAPS.2006.359615","DOI":"10.1109\/NAPS.2006.359615"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Debar H, Curry D, Feinstein B (2007) Rfc 4765: The intrusion detection message exchange format (IDMEF), March 2007. http:\/\/www.ietf.org\/rfc\/rfc4765.txt. Accessed 10 Sept 2013","DOI":"10.17487\/rfc4765"},{"key":"16_CR10","unstructured":"Digital Bond (2006) SCADA honeynet. http:\/\/www.digitalbond.com\/tools\/scada-honeynet\/. Accessed 10 Sept 2013"},{"key":"16_CR28","unstructured":"Directive\u00a094\/9\/EC (1994) Equipment and protective systems intended for use in potentially explosive atmospheres (ATEX)"},{"key":"16_CR11","unstructured":"Fovino IN, Coletta A, Masera M (2010) Taxonomy of security solutions for SCADA sector. Project ESCORTS Deliverable 2.2, Version 1.1"},{"key":"16_CR12","unstructured":"Hes R, Komisarczuk P, Steenson R, Seifert C (2009) The Capture-HPC client architecture. Technical report, Victoria University of Wellington"},{"key":"16_CR13","unstructured":"Honeyd (2008) Developments of the honeyd virtual honeypot. http:\/\/www.honeyd.org\/. Accessed 10 Sept 2013"},{"issue":"7","key":"16_CR14","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","volume":"25","author":"V Igure","year":"2006","unstructured":"Igure V, Laughter S, Williams R (2006) Security issues in SCADA networks. Comput Secur 25(7):498\u2013506. doi:10.1016\/j.cose.2006.03.001","journal-title":"Comput Secur"},{"key":"16_CR15","unstructured":"ISA-99.00.01 (2007) Security for industrial automation and control systems\u2014part 1: terminology, concepts, and models. American National Standard, Research Triangle Park"},{"issue":"9","key":"16_CR16","doi-asserted-by":"crossref","first-page":"1521","DOI":"10.1016\/j.ijepes.2009.03.004","volume":"33","author":"DJ Kang","year":"2011","unstructured":"Kang DJ, Lee JJ, Kim BH, Hur D (2011) Proposal strategies of key management for data encryption in SCADA network of electric power systems. Int J Electr Power Energy Syst 33(9):1521\u20131526","journal-title":"Int J Electr Power Energy Syst"},{"key":"16_CR17","unstructured":"Krutz RL (2006) Securing scada systems. Wiley, Indianapolis"},{"key":"16_CR29","unstructured":"Libpcap (2010) TCPDUMP\/LIBPCAP public repository. http:\/\/www.tcpdump.org\/. Accessed 10 Sept 2013"},{"key":"16_CR18","unstructured":"Modbus (2006) Modbus application protocol specification V1.1b. http:\/\/www.modbus.org\/specs.php. Accessed 10 Sept 2013"},{"key":"16_CR30","unstructured":"Modbus-tk (2011) Implementation of the Modbus protocol in the Python programming language. http:\/\/code.google.com\/p\/modbus-tk\/. Accessed 10 Sept 2013"},{"key":"16_CR31","unstructured":"ModSnmp (2013) ModSnmp: Modbus-SNMP converter. Wingpath software development. http:\/\/wingpath.co.uk\/modbus\/modsnmp.php. Accessed 15 Sept 2013"},{"key":"16_CR32","volume-title":"Why can\u2019t we be friends: monitoring the server room by introducing Modbus to SNMP","author":"Moxa","year":"2009","unstructured":"Moxa (2009) Why can\u2019t we be friends: monitoring the server room by introducing Modbus to SNMP. Moxa Americas Inc, Moxa White Paper"},{"key":"16_CR33","unstructured":"Net-SNMP (2000) Net-SNMP. http:\/\/www.net-snmp.org\/. Accessed 10 Sept 2013"},{"key":"16_CR20","first-page":"1","volume-title":"In: Proceedings of the 13th conference on USENIX security symposium\u2014(SSYM\u201904), vol 13","author":"N Provos","year":"2004","unstructured":"Provos N (2004) A virtual honeypot framework. In: Proceedings of the 13th conference on USENIX security symposium\u2014(SSYM\u201904), vol 13. USENIX Association, Berkeley, p 1"},{"key":"16_CR34","unstructured":"Pymodbus (2011) A Modbus protocol stack in python. http:\/\/code.google.com\/p\/pymodbus\/. Accessed 10 Sept 2013"},{"key":"16_CR35","unstructured":"Raspberry Pi Foundation (2012) What is Raspberry Pi? http:\/\/www.raspberrypi.org\/. Accessed 10 Sept 2013"},{"key":"16_CR21","unstructured":"Riden J, Seifert C (2010) A guide to different kinds of honeypots. Symantec connect. http:\/\/www.symantec.com\/connect\/articles\/guide-different-kinds-honeypots. Accessed 10 Sept 2013"},{"key":"16_CR22","volume-title":"Honeypots: tracking hackers","author":"L Spitzner","year":"2002","unstructured":"Spitzner L (2002) Honeypots: tracking hackers. Addison-Wesley, Boston"},{"issue":"4","key":"16_CR23","doi-asserted-by":"publisher","first-page":"1836","DOI":"10.1109\/TPWRS.2008.2002298","volume":"23","author":"C Ten","year":"2008","unstructured":"Ten C, Liu C, Manimaran G (2008) Vulnerability assessment of cybersecurity for SCADA systems. IEEE Trans Power Syst 23(4):1836\u20131846. doi:10.1109\/TPWRS.2008.2002298","journal-title":"IEEE Trans Power Syst"},{"key":"16_CR24","unstructured":"Triangle MicroWorks Inc (2002) DNP3 overview, Raleigh, North Carolina. http:\/\/www.trianglemicroworks.com\/documents\/DNP3_Overview.pdf. Accessed 10 Sept 2013"},{"key":"16_CR36","unstructured":"Tsubakimoto (2011) SNMP agent module for tsubaki monitor maker mitaro 32. http:\/\/tsubakimoto.com\/press\/20110221.html. Accessed 15 Sept 2013"},{"key":"16_CR37","unstructured":"VSFTPd (2011) Vsftpd\u2014secure, fast FTP server for UNIX-like systems. https:\/\/security.appspot.com\/vsftpd.html. Accessed 10 Sept 2013"},{"key":"16_CR25","unstructured":"Wang Y, Beck D, Jiang X, Roussev R, Verbowski C, Chen S, King ST (2006) Automated web patrol with strider honeymonkeys: finding web sites that exploit browser vulnerabilities. In: NDSS"},{"key":"16_CR27","unstructured":"Waterfall Security Solutions Ltd. (2013) Waterfall one-way. http:\/\/www.waterfall-security.com\/category\/products\/scada-protocols\/. Accessed 10 Sept 2013"},{"key":"16_CR26","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1109\/iThings\/CPSCom.2011.34","volume-title":"In: Proceedings of the 2011 international conference on internet of things and 4th international conference on cyber, physical and social computing (ITHINGSCPSCOM \u201811)","author":"B Zhu","year":"2011","unstructured":"Zhu B, Joseph A, Sastry S (2011) A taxonomy of cyber attacks on SCADA systems. In: Proceedings of the 2011 international conference on internet of things and 4th international conference on cyber, physical and social computing (ITHINGSCPSCOM \u201811). IEEE Computer Society, Washington, pp 380\u2013388"}],"container-title":["Intelligent Systems, Control and Automation: Science and Engineering","Cyber Security: Analytics, Technology and Automation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18302-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T10:42:05Z","timestamp":1676457725000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18302-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319183015","9783319183022"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18302-2_16","relation":{},"ISSN":["2213-8986","2213-8994"],"issn-type":[{"type":"print","value":"2213-8986"},{"type":"electronic","value":"2213-8994"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"31 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}