{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T03:36:51Z","timestamp":1769312211480,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,28]],"date-time":"2011-03-28T00:00:00Z","timestamp":1301270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,28]]},"DOI":"10.1145\/1963405.1963437","type":"proceedings-article","created":{"date-parts":[[2011,3,29]],"date-time":"2011-03-29T12:02:18Z","timestamp":1301400138000},"page":"207-216","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Heat-seeking honeypots"],"prefix":"10.1145","author":[{"given":"John P.","family":"John","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Fang","family":"Yu","sequence":"additional","affiliation":[{"name":"Microsoft Research, Silicon Valley, CA, USA"}]},{"given":"Yinglian","family":"Xie","sequence":"additional","affiliation":[{"name":"Microsoft Research, Silicon Valley, CA, USA"}]},{"given":"Arvind","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Mart\u00edn","family":"Abadi","sequence":"additional","affiliation":[{"name":"Microsoft Research, Silicon Valley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,3,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bing. http:\/\/www.bing.com.  Bing. http:\/\/www.bing.com."},{"key":"e_1_3_2_1_2_1","unstructured":"DShield Web Honeypot Project. http:\/\/sites.google.com\/site\/webhoneypotsite\/.  DShield Web Honeypot Project. http:\/\/sites.google.com\/site\/webhoneypotsite\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Glasstopf Honeypot Project. http:\/\/glastopf.org\/.  Glasstopf Honeypot Project. http:\/\/glastopf.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Most web attacks come via compromised legitimate websites. http:\/\/www.computerweekly.com\/Articles\/2010\/06\/18\/241655\/Most-web-attacks-come-via-compromised%-legitimate-wesites.htm.  Most web attacks come via compromised legitimate websites. http:\/\/www.computerweekly.com\/Articles\/2010\/06\/18\/241655\/Most-web-attacks-come-via-compromised%-legitimate-wesites.htm."},{"key":"e_1_3_2_1_5_1","unstructured":"PlanetLab. http:\/\/www.planet-lab.org\/.  PlanetLab. http:\/\/www.planet-lab.org\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Snort : a free light-weight network intrustion detection system for UNIX and Windows. http:\/\/www.snort.org\/.  Snort : a free light-weight network intrustion detection system for UNIX and Windows. http:\/\/www.snort.org\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Spam SEO trends & statistics. http:\/\/research.zscaler.com\/2010\/07\/spam-seo-trends-statistics-part-ii.html.  Spam SEO trends & statistics. http:\/\/research.zscaler.com\/2010\/07\/spam-seo-trends-statistics-part-ii.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Google Hack Honeypot 2005. http:\/\/ghh.sourceforge.net\/.  Google Hack Honeypot 2005. http:\/\/ghh.sourceforge.net\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060309"},{"key":"e_1_3_2_1_11_1","volume-title":"The RBSE Spider - balancing effective search against Web load","author":"Eichmann D.","year":"1994","unstructured":"D. Eichmann . The RBSE Spider - balancing effective search against Web load , 1994 . D. Eichmann. The RBSE Spider - balancing effective search against Web load, 1994."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 19th USENIX Security Symposium","author":"John J. P.","year":"2010","unstructured":"J. P. John , F. Yu , Y. Xie , M. Abadi , and A. Krishnamurthy . Searching the Searchers with SearchAudit . In Proceedings of the 19th USENIX Security Symposium , 2010 . J. P. John, F. Yu, Y. Xie, M. Abadi, and A. Krishnamurthy. Searching the Searchers with SearchAudit. In Proceedings of the 19th USENIX Security Symposium, 2010."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 2nd Workshop on Hot Topics in Networks (HotNets)","author":"Kreibich C.","year":"2003","unstructured":"C. Kreibich and J. Crowcroft . Honeycomb: Creating intrusion detection signatures using honeypots . In Proceedings of the 2nd Workshop on Hot Topics in Networks (HotNets) , 2003 . C. Kreibich and J. Crowcroft. Honeycomb: Creating intrusion detection signatures using honeypots. In Proceedings of the 2nd Workshop on Hot Topics in Networks (HotNets), 2003."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_16"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS)","author":"Moshchuk A.","year":"2006","unstructured":"A. Moshchuk , T. Bragin , S. D. Gribble , and H. M. Levy . A crawler-based study of spyware on the web . In Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS) , 2006 . A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy. A crawler-based study of spyware on the web. In Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS), 2006."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 13th USENIX Security Symposium","author":"Provos N.","year":"2004","unstructured":"N. Provos . A virtual honeypot framework . In Proceedings of the 13th USENIX Security Symposium , 2004 . N. Provos. A virtual honeypot framework. In Proceedings of the 13th USENIX Security Symposium, 2004."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179542.1179544"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 17th USENIX Security Symposium","author":"Small S.","year":"2008","unstructured":"S. Small , J. Mason , F. Monrose , N. Provos , and A. Stubblefield . To catch a predator: a natural language approach for eliciting malicious payloads . In Proceedings of the 17th USENIX Security Symposium , 2008 . S. Small, J. Mason, F. Monrose, N. Provos, and A. Stubblefield. To catch a predator: a natural language approach for eliciting malicious payloads. In Proceedings of the 17th USENIX Security Symposium, 2008."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402979"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 14th USENIX Security Symposium","author":"Yegneswaran V.","year":"2005","unstructured":"V. Yegneswaran , J. T. Giffin , P. Barford , and S. Jha . An architecture for generating semantics-aware signatures . In Proceedings of the 14th USENIX Security Symposium , 2005 . V. Yegneswaran, J. T. Giffin, P. Barford, and S. Jha. An architecture for generating semantics-aware signatures. In Proceedings of the 14th USENIX Security Symposium, 2005."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS)","author":"Wang Yi.","year":"2006","unstructured":"Yi. Wang , D. Beck , X. Jiang , R. Roussev , C. Verbowski , S. Chen , and S. King . Automated Web Patrol with Strider HoneyMonkeys . In Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS) , 2006 . Yi. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated Web Patrol with Strider HoneyMonkeys. In Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS), 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718540"}],"event":{"name":"WWW '11: 20th International World Wide Web Conference","location":"Hyderabad India","acronym":"WWW '11","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","The International Institute of Information Technology Bangalore The International Institute of Information Technology Bangalore"]},"container-title":["Proceedings of the 20th international conference on World wide web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1963405.1963437","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1963405.1963437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:18Z","timestamp":1750243938000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1963405.1963437"}},"subtitle":["design and experience"],"short-title":[],"issued":{"date-parts":[[2011,3,28]]},"references-count":22,"alternative-id":["10.1145\/1963405.1963437","10.1145\/1963405"],"URL":"https:\/\/doi.org\/10.1145\/1963405.1963437","relation":{},"subject":[],"published":{"date-parts":[[2011,3,28]]},"assertion":[{"value":"2011-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}