{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T10:40:55Z","timestamp":1762252855642,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/fuzz-ieee.2018.8491456","type":"proceedings-article","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T22:18:38Z","timestamp":1539987518000},"page":"1-8","source":"Crossref","is-referenced-by-count":26,"title":["Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots"],"prefix":"10.1109","author":[{"given":"Nitin","family":"Naik","sequence":"first","affiliation":[]},{"given":"Paul","family":"Jenkins","sequence":"additional","affiliation":[]},{"given":"Roger","family":"Cooke","sequence":"additional","affiliation":[]},{"given":"Longzhi","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2016.2582526"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2013.04.001"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2011.2161584"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2015.7338026"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2017.8015711"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2016.7737671"},{"key":"ref11","article-title":"Dynamic fuzzy rule interpolation and its application to intrusion detection","author":"naik","year":"2017","journal-title":"IEEE Transactions on Fuzzy Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2017.8015710"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1109\/SSCI.2016.7849907","article-title":"Big data security analysis approach using computational intelligence techniques in R for desk- top users","author":"naik","year":"2016","journal-title":"IEEE Symposium Series on Computational Intelligence (SSCI)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/ICIF.2018.8455555"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.269"},{"article-title":"Chapter 8. Remote OS Detection: TCP\/IP Fingerprinting Methods supported by Nmap","year":"2009","author":"lyon","key":"ref16"},{"key":"ref17","first-page":"1","article-title":"Toward undetected operating system fingerprinting","volume":"7","author":"greenwald","year":"2007","journal-title":"WOOT"},{"journal-title":"Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning","year":"2009","author":"lyon","key":"ref18"},{"article-title":"Chapter 8. Remote OS Detection: Usage and Examples","year":"2009","author":"lyon","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2013.6622404"},{"article-title":"OS and Application Fingerprinting Techniques","year":"2008","author":"allen","key":"ref4"},{"key":"ref27","article-title":"Dynamic Fuzzy Rule Interpolation","author":"naik","year":"2015","journal-title":"Ph D Dissertation"},{"key":"ref3","volume":"1","author":"spitzner","year":"2003","journal-title":"Honeypots Tracking Hackers"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.64"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2014.6891816"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2016.7737764"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2017.8015461"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2017.8015701"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1002\/9781119396260","author":"grimes","year":"2017","journal-title":"Honeypots in Hacking the Hacker Learn from the Experts Who Take Down Hackers"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.306"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1201\/b10738","author":"joshi","year":"2011","journal-title":"Honeypots A New Paradigm to Information Security"},{"article-title":"Chapter 15. Nmap Reference Guide","year":"2009","author":"lyon","key":"ref20"},{"article-title":"Chapter 15. Service and Version Detection","year":"2009","author":"lyon","key":"ref22"},{"article-title":"Chapter 7. Service and Application Version Detection","year":"2009","author":"lyon","key":"ref21"},{"article-title":"Nmap Service DB","year":"2011","author":"lyon","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(75)80002-2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/UKCI.2012.6335756"},{"article-title":"Nmap OS Fingerprinting 2nd Generation DB","year":"2017","author":"lyon","key":"ref25"}],"event":{"name":"2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2018,7,8]]},"location":"Rio de Janeiro","end":{"date-parts":[[2018,7,13]]}},"container-title":["2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8466242\/8491438\/08491456.pdf?arnumber=8491456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:15:25Z","timestamp":1598228125000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8491456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/fuzz-ieee.2018.8491456","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}