{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T18:15:44Z","timestamp":1777486544650,"version":"3.51.4"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/cybersecpods.2017.8074855","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T19:23:33Z","timestamp":1508959413000},"page":"1-7","source":"Crossref","is-referenced-by-count":25,"title":["Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Fraunholz","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Krohmer","sequence":"additional","affiliation":[]},{"given":"Simon Duque","family":"Anton","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Dieter Schotten","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Fruhwamsystem, sicherheitstacho","year":"2017","journal-title":"Telekom DTAG"},{"key":"ref11","first-page":"40","article-title":"The leurre project: Collecting internet threats information using a worldwide distributed honeynet","author":"leita","year":"0","journal-title":"2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing wistdcs"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.76"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270293"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2011.29"},{"key":"ref15","article-title":"An experimental study of ssh attacks by using honeypot decoys","volume":"6","author":"kheirkhah","year":"2013","journal-title":"Indian Journal of Science and Technology"},{"key":"ref16","author":"sobesto","year":"2015","journal-title":"Empirical studies based on empirical studies based on honeypots for characterizing attackers behavior"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39639-2_6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279800"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5772\/13951"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289263"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.40"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1198\/016214503000000666"},{"key":"ref3","article-title":"The future of cybercrime & security: Financial & corporate threats & mitigation 2015-2020","year":"2015","journal-title":"Juniper Research"},{"key":"ref6","author":"jose","year":"2005","journal-title":"Kojoney - A honeypot for the SSH Service"},{"key":"ref29","author":"krause","year":"2012","journal-title":"Taxicab Geometry An Adventure in Non-Euclidean Geometry ser Dover Books on Mathematics"},{"key":"ref5","author":"krebs","year":"2016","journal-title":"Krebsonsecurity hit with record ddos"},{"key":"ref8","author":"tamminen","year":"2009","journal-title":"Kippoo ssh medium-interaction honeypot"},{"key":"ref7","article-title":"Kojoney2, ssh medium-interaction honeypot","year":"2015","journal-title":"Pennsylvania University"},{"key":"ref2","article-title":"Internet crime report 2015","year":"2015","journal-title":"FBI"},{"key":"ref9","author":"oosterhof","year":"2014","journal-title":"Cowrie ssh medium-interaction honeypot"},{"key":"ref1","article-title":"Internet organized crime threat assessment","year":"2016","journal-title":"Europolitics"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/NPC.2008.82"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.06.004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.012"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2017.7943186"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2009.1056"},{"key":"ref26","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume":"1","author":"macqueen","year":"0","journal-title":"Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability"},{"key":"ref25","author":"sam","year":"2016","journal-title":"Hajime Analysis of a Decentralized Internet Worm for IoT Devices"}],"event":{"name":"2017 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security)","location":"London, United Kingdom","start":{"date-parts":[[2017,6,19]]},"end":{"date-parts":[[2017,6,20]]}},"container-title":["2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8054574\/8074842\/08074855.pdf?arnumber=8074855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T20:00:44Z","timestamp":1512072044000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8074855\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cybersecpods.2017.8074855","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}