{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:12:54Z","timestamp":1767982374685,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,2]],"date-time":"2017-04-02T00:00:00Z","timestamp":1491091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,2]]},"DOI":"10.1145\/3055186.3055192","type":"proceedings-article","created":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T12:22:54Z","timestamp":1490962974000},"page":"57-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":77,"title":["SIPHON"],"prefix":"10.1145","author":[{"given":"Juan David","family":"Guarnizo","sequence":"first","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Amit","family":"Tambe","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Suman Sankar","family":"Bhunia","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Martin","family":"Ochoa","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Nils Ole","family":"Tippenhauer","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[{"name":"Ben Gurion University, Be'er Sheva, Israel"}]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2017,4,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"DLink dcs-930l camera vulnerability. http:\/\/securityaffairs.co\/wordpress\/49143\/breaking-news\/d-link.html. Accessed: 2016-08--10.  DLink dcs-930l camera vulnerability. http:\/\/securityaffairs.co\/wordpress\/49143\/breaking-news\/d-link.html. Accessed: 2016-08--10."},{"key":"e_1_3_2_1_2_1","unstructured":"Masscan the internet port scanner. http:\/\/tools.kali.org\/information-gathering\/masscan. Accessed: 2016-08--10.  Masscan the internet port scanner. http:\/\/tools.kali.org\/information-gathering\/masscan. Accessed: 2016-08--10."},{"key":"e_1_3_2_1_3_1","unstructured":"2005. ITU report : The Internet of Things.  2005. ITU report : The Internet of Things."},{"key":"e_1_3_2_1_4_1","volume-title":"Redirecting Hackers to Honeypots","author":"DecoyPort The","year":"2007","unstructured":"The DecoyPort : Redirecting Hackers to Honeypots . Springer Berlin Heidelberg , September 2007 . The DecoyPort: Redirecting Hackers to Honeypots. Springer Berlin Heidelberg, September 2007."},{"key":"e_1_3_2_1_5_1","unstructured":"2016. Gartner report Forecast: IoT Security Worldwide.  2016. Gartner report Forecast: IoT Security Worldwide."},{"key":"e_1_3_2_1_6_1","unstructured":"2016. IDC report Internet of Things: Security Practices.  2016. IDC report Internet of Things: Security Practices."},{"key":"e_1_3_2_1_7_1","volume-title":"Lessons learned from the deployment of a high-interaction honeypot. arXiv preprint arXiv:0704.0858","author":"Alata Eric","year":"2007","unstructured":"Eric Alata , Vincent Nicomette , Marc Dacier , Matthieu Herrb , Lessons learned from the deployment of a high-interaction honeypot. arXiv preprint arXiv:0704.0858 , 2007 . Eric Alata, Vincent Nicomette, Marc Dacier, Matthieu Herrb, et al. Lessons learned from the deployment of a high-interaction honeypot. arXiv preprint arXiv:0704.0858, 2007."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.71"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.03.001"},{"key":"e_1_3_2_1_11_1","volume-title":"20th Annual Network & Distributed System Security Symposium (NDSS)","author":"Canali Davide","year":"2013","unstructured":"Davide Canali and Davide Balzarotti . Behind the scenes of online attacks: an analysis of exploitation behaviors on the web . In 20th Annual Network & Distributed System Security Symposium (NDSS) , 2013 . Davide Canali and Davide Balzarotti. Behind the scenes of online attacks: an analysis of exploitation behaviors on the web. In 20th Annual Network & Distributed System Security Symposium (NDSS), 2013."},{"key":"e_1_3_2_1_12_1","unstructured":"Dyn attack 2016. http:\/\/dyn.com\/blog\/dyn-analysis-summary-of-friday-october-21-attack\/. Accessed: 2016--12-06.  Dyn attack 2016. http:\/\/dyn.com\/blog\/dyn-analysis-summary-of-friday-october-21-attack\/. Accessed: 2016--12-06."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/IntelliSys.2015.7361266"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. Network and Distributed System Security Symp. (NDSS)","author":"Francillon Aur\u00e9lien","year":"2011","unstructured":"Aur\u00e9lien Francillon , Boris Danev , and Srdjan Capkun . Relay attacks on passive keyless entry and start systems in modern cars . In Proc. Network and Distributed System Security Symp. (NDSS) , 2011 . Aur\u00e9lien Francillon, Boris Danev, and Srdjan Capkun. Relay attacks on passive keyless entry and start systems in modern cars. In Proc. Network and Distributed System Security Symp. (NDSS), 2011."},{"key":"e_1_3_2_1_15_1","article-title":"The Use of Honeynets to Increase Computer Network Security and User Awareness","author":"Grizzard Julian B.","year":"2005","unstructured":"Julian B. Grizzard , Sven Krasser , and Henry L. Owen . The Use of Honeynets to Increase Computer Network Security and User Awareness . Journal of Security Education, 1(2--3):23--37 , 2005 . Julian B. Grizzard, Sven Krasser, and Henry L. Owen. The Use of Honeynets to Increase Computer Network Security and User Awareness. Journal of Security Education, 1(2--3):23--37, 2005.","journal-title":"Journal of Security Education, 1(2--3):23--37"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.358"},{"key":"e_1_3_2_1_17_1","volume-title":"IPWHOIS: A library for RDAP (HTTP) lookups. https:\/\/pypi.python.org\/pypi\/ipwhois","author":"Hane Philip","year":"2015","unstructured":"Philip Hane . IPWHOIS: A library for RDAP (HTTP) lookups. https:\/\/pypi.python.org\/pypi\/ipwhois , 2015 . Philip Hane. IPWHOIS: A library for RDAP (HTTP) lookups. https:\/\/pypi.python.org\/pypi\/ipwhois, 2015."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861394"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24707-4_33"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICETA.2011.6112567"},{"key":"e_1_3_2_1_24_1","volume-title":"Deceptive attack and defense game in honeypot-enabled networks for the internet of things","author":"La Q. D.","year":"2016","unstructured":"Q. D. La , T. Quek , J. Lee , S. Jin , and H. Zhu . Deceptive attack and defense game in honeypot-enabled networks for the internet of things . IEEE Internet of Things Journal , PP(99):1--1, 2016 . Q. D. La, T. Quek, J. Lee, S. Jin, and H. Zhu. Deceptive attack and defense game in honeypot-enabled networks for the internet of things. IEEE Internet of Things Journal, PP(99):1--1, 2016."},{"key":"e_1_3_2_1_25_1","unstructured":"John C Matherly. SHODAN the computer search engine. https:\/\/www.shodan.io. Accessed: 2016-08-01.  John C Matherly. SHODAN the computer search engine. https:\/\/www.shodan.io. Accessed: 2016-08-01."},{"key":"e_1_3_2_1_26_1","unstructured":"Mirai malware 2016. http:\/\/blog.malwaremustdie.org\/2016\/08\/mmd-0056--2016-linuxmirai-just.html. Accessed: 2016--12-04.  Mirai malware 2016. http:\/\/blog.malwaremustdie.org\/2016\/08\/mmd-0056--2016-linuxmirai-just.html. Accessed: 2016--12-04."},{"key":"e_1_3_2_1_27_1","volume-title":"Christian Rossow. IoTPOT: Analysing the Rise of IoT Compromises. In 9th USENIX Workshop on Offensive Technologies (WOOT). USENIX Association","author":"Pa Pa Yin Minn","year":"2015","unstructured":"Yin Minn Pa Pa , Shogo Suzuki , Katsunari Yoshioka , Tsutomu Matsumoto , Takahiro Kasama , and Christian Rossow. IoTPOT: Analysing the Rise of IoT Compromises. In 9th USENIX Workshop on Offensive Technologies (WOOT). USENIX Association , 2015 . Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, and Christian Rossow. IoTPOT: Analysing the Rise of IoT Compromises. In 9th USENIX Workshop on Offensive Technologies (WOOT). USENIX Association, 2015."},{"key":"e_1_3_2_1_28_1","first-page":"201","volume-title":"Game Theoretic Model of Strategic Honeypot Selection in Computer Networks","author":"P\u00edbil Radek","year":"2012","unstructured":"Radek P\u00edbil , Viliam Lis\u00fd , Christopher Kiekintveld , Branislav Bosansk\u00fd , and Michal Pechoucek . Game Theoretic Model of Strategic Honeypot Selection in Computer Networks , pages 201 -- 220 . Springer Berlin Heidelberg , November 2012 . Radek P\u00edbil, Viliam Lis\u00fd, Christopher Kiekintveld, Branislav Bosansk\u00fd, and Michal Pechoucek. Game Theoretic Model of Strategic Honeypot Selection in Computer Networks, pages 201--220. Springer Berlin Heidelberg, November 2012."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the E-Crime and Computer Evidence Conference","author":"Pouget F","year":"2005","unstructured":"F Pouget , M Dacier , and VH Pham . on the advantages of deploying a large scale distributed honeypot platform . In Proceedings of the E-Crime and Computer Evidence Conference , 2005 . F Pouget, M Dacier, and VH Pham. on the advantages of deploying a large scale distributed honeypot platform. In Proceedings of the E-Crime and Computer Evidence Conference, 2005."},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. of the USENIX Security Symposium","author":"Provos Niels","year":"2004","unstructured":"Niels Provos . A virtual honeypot framework . In Proc. of the USENIX Security Symposium , 2004 . Niels Provos. A virtual honeypot framework. In Proc. of the USENIX Security Symposium, 2004."},{"key":"e_1_3_2_1_31_1","volume-title":"Pearson Education","author":"Provos Niels","year":"2007","unstructured":"Niels Provos and Thorsten Holz . Virtual honeypots: from botnet tracking to intrusion detection . Pearson Education , 2007 . Niels Provos and Thorsten Holz. Virtual honeypots: from botnet tracking to intrusion detection. Pearson Education, 2007."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2981546"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193207"},{"issue":"2","key":"e_1_3_2_1_34_1","first-page":"37","article-title":"Security architecture of the internet of things oriented to perceptual layer. International Journal on Computer","volume":"2","author":"Zhang Weizhe","year":"2013","unstructured":"Weizhe Zhang and Baosheng Qu . Security architecture of the internet of things oriented to perceptual layer. International Journal on Computer , Consumer and Control (IJ3C) , 2 ( 2 ): 37 -- 45 , 2013 . Weizhe Zhang and Baosheng Qu. Security architecture of the internet of things oriented to perceptual layer. International Journal on Computer, Consumer and Control (IJ3C), 2(2):37--45, 2013.","journal-title":"Consumer and Control (IJ3C)"}],"event":{"name":"ASIA CCS '17: ACM Asia Conference on Computer and Communications Security","location":"Abu Dhabi United Arab Emirates","acronym":"ASIA CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055186.3055192","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3055186.3055192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:36Z","timestamp":1750217796000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055186.3055192"}},"subtitle":["Towards Scalable High-Interaction Physical Honeypots"],"short-title":[],"issued":{"date-parts":[[2017,4,2]]},"references-count":32,"alternative-id":["10.1145\/3055186.3055192","10.1145\/3055186"],"URL":"https:\/\/doi.org\/10.1145\/3055186.3055192","relation":{},"subject":[],"published":{"date-parts":[[2017,4,2]]},"assertion":[{"value":"2017-04-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}