{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:15:00Z","timestamp":1775470500358,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679411","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"387-394","source":"Crossref","is-referenced-by-count":7,"title":["A Modular Generative Honeypot Shell"],"prefix":"10.1109","author":[{"given":"Saul","family":"Johnson","sequence":"first","affiliation":[{"name":"Maritime IT Security Research Group, NHL Stenden,Emmen,The Netherlands"}]},{"given":"Remco","family":"Hassing","sequence":"additional","affiliation":[{"name":"Maritime IT Security Research Group, NHL Stenden,Emmen,The Netherlands"}]},{"given":"Jeroen","family":"Pijpker","sequence":"additional","affiliation":[{"name":"Maritime IT Security Research Group, NHL Stenden,Emmen,The Netherlands"}]},{"given":"Rob","family":"Loves","sequence":"additional","affiliation":[{"name":"Maritime IT Security Research Group, NHL Stenden,Emmen,The Netherlands"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"cowrie","author":"Oosterhof","year":"2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2009.9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2006.17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IoTaIS50849.2021.9359711"},{"key":"ref5","volume-title":"Inversion of control containers and the dependency injection pattern","author":"Fowler","year":"2004"},{"key":"ref6","volume-title":"Design patterns: Elements of Reusable Object-Oriented Software","author":"Gamma","year":"1994"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3605764.3623985"},{"key":"ref8","author":"Liu","year":"2024","journal-title":"Prompt injection attack against 11m-integrated applications"},{"key":"ref9","volume-title":"Kippo - ssh honeypot","author":"Tamminen","year":"2014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2017.8074855"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/eurospw61312.2024.00054"},{"key":"ref12","volume-title":"Openai releases gpt-3, the largest model so far","author":"Sagar","year":"2020"},{"key":"ref13","volume-title":"Galah: Llm-powered web honeypot. wasting attackers time with faker-than-ever http responses!","author":"Karimi","year":"2024"},{"key":"ref14","volume-title":"Get up and running with llama 3, mistral, gemma, and other large language models","year":"2023"},{"key":"ref15","article-title":"Bitter harvest: Systematically fingerprinting low-and medium-interaction honeypots at internet scale","volume-title":"12th USENIX Workshop on Offensive Technologies (WOOT 18)","author":"Vetterl"},{"key":"ref16","volume-title":"Honeyscanner: A vulnerability analyzer for honeypot","year":"2023"},{"key":"ref17","volume-title":"kink","author":"Kraczkowski","year":"2023"},{"key":"ref18","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Advances in Neural Information Processing Systems","volume":"33","author":"Brown","year":"2020"},{"key":"ref19","first-page":"24824","article-title":"Chain-of-thought prompting elicits reasoning in large language models","volume-title":"Advances in Neural Information Processing Systems","volume":"35","author":"Wei","year":"2022"},{"key":"ref20","article-title":"Jinja2 documentation","author":"Ronacher","year":"2008","journal-title":"Welcome to Jinja2-finja2 Documentation (2. 8-dev)"},{"key":"ref21","volume-title":"Nhlstenden-mits\/limbosh: The honeypot shell that traps you in a conversation with an 11m pretending to be a shell","author":"Johnson","year":"2024"},{"key":"ref22","author":"Wolf","year":"2024","journal-title":"Fundamental limitations of alignment in large language models"},{"key":"ref23","volume-title":"deepset, \u201cdeberta-v3-base-injection-dataset,\u201d","year":"2023"},{"key":"ref24","volume-title":"Fine-tuned deberta-v3-base for prompt injection detection","year":"2024"},{"key":"ref25","volume-title":"Hello gpt-4o - openai","year":"2024"},{"key":"ref26","author":"Deng","year":"2023","journal-title":"Pentestgpt: An llm-empowered automatic penetration testing tool"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679411.pdf?arnumber=10679411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T04:58:19Z","timestamp":1727240299000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679411","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}