{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:14:20Z","timestamp":1775470460646,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,19]]},"DOI":"10.1109\/apcc55198.2022.9943718","type":"proceedings-article","created":{"date-parts":[[2022,11,15]],"date-time":"2022-11-15T20:45:04Z","timestamp":1668545104000},"page":"433-438","source":"Crossref","is-referenced-by-count":3,"title":["Analysing Attackers and Intrusions on a High-Interaction Honeypot System"],"prefix":"10.1109","author":[{"given":"Mandy","family":"Kn\u00f6chel","sequence":"first","affiliation":[{"name":"Martin Luther University Halle-Wittenberg,Institute for Computer Science,Halle (Saale),Germany"}]},{"given":"Sandro","family":"Wefel","sequence":"additional","affiliation":[{"name":"Martin Luther University Halle-Wittenberg,Institute for Computer Science,Halle (Saale),Germany"}]}],"member":"263","reference":[{"key":"ref1","author":"Spitzner","year":"2002","journal-title":"Honeypots: Tracking hackers"},{"key":"ref2","article-title":"2020 Unit 42 IoT threat report","volume-title":"Tech. Rep.","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3448734.3450911"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29938-9_6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.76"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-010-0144-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3099012.3099016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/9781119183457"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/diss.2020.23007"},{"key":"ref10","article-title":"RFC4254 - The secure shell (SSH) connection protocol","author":"Ylonen","year":"2006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134614"},{"key":"ref12","volume-title":"VirusTotal","year":"2022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7178164"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417277"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193207"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2017.088133"},{"key":"ref17","article-title":"Know your enemy: Sebek, a kernel based data capture tool","year":"2003"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106669"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2348-5_9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2016.09.03"},{"key":"ref21","first-page":"114","article-title":"Finding evidence of wordlists being deployed against SSH honeypots - implications and impacts","volume-title":"Proceedings of 12th Australian Digital Forensics Conference (ADF 2014)","author":"Rabadia"},{"key":"ref22","first-page":"26","article-title":"Analysis of attempted intrusions: Intelligence gathered from SSH honeypots","volume-title":"Proceedings of the 15th Australian Digital Forensics Conference (ADF 2017)","author":"Rabadia"},{"key":"ref23","first-page":"61","article-title":"Fingerprinting tooling used for SSH compromisation attempts","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)","author":"Ghi\u00ebtte"},{"key":"ref24","article-title":"Bitter harvest: Systematically fingerprinting low- and medium-interaction honeypots at internet scale","volume-title":"12th USENIX Workshop on Offensive Technologies (WOOT 18)","author":"Vetterl"}],"event":{"name":"2022 27th Asia Pacific Conference on Communications (APCC)","location":"Jeju Island, Korea, Republic of","start":{"date-parts":[[2022,10,19]]},"end":{"date-parts":[[2022,10,21]]}},"container-title":["2022 27th Asia Pacific Conference on Communications (APCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9943568\/9943554\/09943718.pdf?arnumber=9943718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:46:23Z","timestamp":1749015983000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9943718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,19]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/apcc55198.2022.9943718","relation":{},"subject":[],"published":{"date-parts":[[2022,10,19]]}}}