{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T12:50:13Z","timestamp":1778676613903,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3140549.3140555","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"65-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Evaluation of Deception-Based Web Attacks Detection"],"prefix":"10.1145","author":[{"given":"Xiao","family":"Han","sequence":"first","affiliation":[{"name":"Orange Labs &amp; Eurecom, Chatillon, France"}]},{"given":"Nizar","family":"Kheir","sequence":"additional","affiliation":[{"name":"Thales Group, Palaiseau, France"}]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[{"name":"Eurecom, Biot Sophia Antipolis, France"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Conference on Cyber Warfare and Security","author":"Almeshekah M.","year":"2014","unstructured":"M. Almeshekah and E. Spafford . The case of using negative (deceiving) information in data protection . In International Conference on Cyber Warfare and Security , 2014 . M. Almeshekah and E. Spafford. The case of using negative (deceiving) information in data protection. In International Conference on Cyber Warfare and Security, 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"Usenix Security","author":"Anagnostakis K. G.","year":"2005","unstructured":"K. G. Anagnostakis , S. Sidiroglou , P. Akritidis , K. Xinidis , E. P. Markatos , and A. D. Keromytis . Detecting targeted attacks using shadow honeypots . In Usenix Security , 2005 . K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. P. Markatos, and A. D. Keromytis. Detecting targeted attacks using shadow honeypots. In Usenix Security, 2005."},{"key":"e_1_3_2_1_4_1","unstructured":"C. Anton. \"Deception as Detection\" or Give Deception a Chance? 2016.  C. Anton. \"Deception as Detection\" or Give Deception a Chance? 2016."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660329"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2011.5984063"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05284-2_4"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2010.89"},{"key":"e_1_3_2_1_9_1","volume-title":"Implementation of Honeytoken Module In DBMS Oracle 9ir2 Enterprise Edition for Internal Malicious Activity Detection","author":"\u010cenys A.","year":"2005","unstructured":"A. \u010cenys , D. Rainys , L. Radvilavi\u010dius , and N. Goranin . Implementation of Honeytoken Module In DBMS Oracle 9ir2 Enterprise Edition for Internal Malicious Activity Detection . In IEEE Computer Society's TC on Security and Privacy, 2005 . A. \u010cenys, D. Rainys, L. Radvilavi\u010dius, and N. Goranin. Implementation of Honeytoken Module In DBMS Oracle 9ir2 Enterprise Edition for Internal Malicious Activity Detection. In IEEE Computer Society's TC on Security and Privacy, 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(98)80071-0"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808480"},{"key":"e_1_3_2_1_12_1","volume-title":"Global b2c e-commerce report","author":"Foundation Ecommerce","year":"2016","unstructured":"Ecommerce Foundation . Global b2c e-commerce report 2016 . https:\/\/www.ecommercewiki.org\/wikis\/www.ecommercewiki.org\/images\/5\/56\/Global_B2C_Ecommerce_Report_2016.pdf, 2016. Ecommerce Foundation. Global b2c e-commerce report 2016. https:\/\/www.ecommercewiki.org\/wikis\/www.ecommercewiki.org\/images\/5\/56\/Global_B2C_Ecommerce_Report_2016.pdf, 2016."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2007.372823"},{"key":"e_1_3_2_1_14_1","volume-title":"Intrusion deception in defense of computer systems. Technical report","author":"Goh H. C.","year":"2007","unstructured":"H. C. Goh . Intrusion deception in defense of computer systems. Technical report , 2007 . H. C. Goh. Intrusion deception in defense of computer systems. Technical report, 2007."},{"key":"e_1_3_2_1_15_1","unstructured":"Internet Live Stats. Total number of websites. http:\/\/www.internetlivestats.com\/total-number-of-websites\/ 2017.  Internet Live Stats. Total number of websites. http:\/\/www.internetlivestats.com\/total-number-of-websites\/ 2017."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516671"},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Internet Computing, ICOMP'13","author":"Katsinis C.","year":"2013","unstructured":"C. Katsinis , B. Kumar , S. Technology , and R. Systems . A Framework for Intrusion Deception on Web Servers . In International Conference on Internet Computing, ICOMP'13 , 2013 . C. Katsinis, B. Kumar, S. Technology, and R. Systems. A Framework for Intrusion Deception on Web Servers. In International Conference on Internet Computing, ICOMP'13, 2013."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191183"},{"key":"e_1_3_2_1_20_1","volume-title":"The Value of Honeypots","author":"Lance S.","year":"2001","unstructured":"S. Lance . The Value of Honeypots , Part One: Definitions and Values of Honeypots , 2001 . S. Lance. The Value of Honeypots, Part One: Definitions and Values of Honeypots, 2001."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541315"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.435"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the IEEE Workshop on Information Assurance","author":"Michael B.","year":"2002","unstructured":"B. Michael , M. Auguston , N. Rowe , and R. Riehle . Software Decoys: Intrusion Detection and Countermeasures . In Proceedings of the IEEE Workshop on Information Assurance , 2002 . B. Michael, M. Auguston, N. Rowe, and R. Riehle. Software Decoys: Intrusion Detection and Countermeasures. In Proceedings of the IEEE Workshop on Information Assurance, 2002."},{"key":"e_1_3_2_1_24_1","volume-title":"https:\/\/github.com\/mushorg\/glastopf\/blob\/master\/glastopf\/requests.xml","author":"Foundation MushMush","year":"2017","unstructured":"MushMush Foundation . Glastopf. https:\/\/github.com\/mushorg\/glastopf\/blob\/master\/glastopf\/requests.xml , 2017 . MushMush Foundation. Glastopf. https:\/\/github.com\/mushorg\/glastopf\/blob\/master\/glastopf\/requests.xml, 2017."},{"key":"e_1_3_2_1_25_1","volume-title":"Appsensor project guide. https:\/\/www.owasp.org\/index.php\/File:Owasp-appsensor-guide-v2.pdf","author":"OWASP.","year":"2015","unstructured":"OWASP. Appsensor project guide. https:\/\/www.owasp.org\/index.php\/File:Owasp-appsensor-guide-v2.pdf , 2015 . OWASP. Appsensor project guide. https:\/\/www.owasp.org\/index.php\/File:Owasp-appsensor-guide-v2.pdf, 2015."},{"key":"e_1_3_2_1_26_1","volume-title":"RES: Protocol Anomaly Detection IDS - Honeypots","author":"de Barros A. Paes","year":"2003","unstructured":"A. Paes de Barros . RES: Protocol Anomaly Detection IDS - Honeypots , 2003 . A. Paes de Barros. RES: Protocol Anomaly Detection IDS - Honeypots, 2003."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2015.7160478"},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Security Symposium","author":"Provos N.","year":"2004","unstructured":"N. Provos , A virtual honeypot framework . In USENIX Security Symposium , 2004 . N. Provos, et al. A virtual honeypot framework. In USENIX Security Symposium, 2004."},{"key":"e_1_3_2_1_29_1","volume-title":"http:\/\/greim.github.io\/hoxy\/","author":"Reimer G.","year":"2015","unstructured":"G. Reimer . Hoxy. http:\/\/greim.github.io\/hoxy\/ , 2015 . G. Reimer. Hoxy. http:\/\/greim.github.io\/hoxy\/, 2015."},{"key":"e_1_3_2_1_30_1","volume-title":"Honeytokens: The other honeypot","author":"Spitzner L.","year":"2003","unstructured":"L. Spitzner . Honeytokens: The other honeypot , 2003 . L. Spitzner. Honeytokens: The other honeypot, 2003."},{"key":"e_1_3_2_1_31_1","volume-title":"The cuckoo's egg: tracking a spy through the maze of computer espionage","author":"Stoll C.","year":"1989","unstructured":"C. Stoll . The cuckoo's egg: tracking a spy through the maze of computer espionage . 1989 . C. Stoll. The cuckoo's egg: tracking a spy through the maze of computer espionage. 1989."},{"key":"e_1_3_2_1_32_1","volume-title":"Internet security threat report. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-21-2016-en.pdf","year":"2016","unstructured":"Symantec. Internet security threat report. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-21-2016-en.pdf , 2016 . Symantec. Internet security threat report. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-21-2016-en.pdf, 2016."},{"key":"e_1_3_2_1_33_1","volume-title":"How digital and technology transformation saved 1.7bn last year. https:\/\/gds.blog.gov.uk\/2015\/10\/23\/how-digital-and-technology-transformation-saved-1-7bn-last-year\/","author":"Government Digital Service UK","year":"2015","unstructured":"UK Government Digital Service . How digital and technology transformation saved 1.7bn last year. https:\/\/gds.blog.gov.uk\/2015\/10\/23\/how-digital-and-technology-transformation-saved-1-7bn-last-year\/ , 2015 . UK Government Digital Service. How digital and technology transformation saved 1.7bn last year. https:\/\/gds.blog.gov.uk\/2015\/10\/23\/how-digital-and-technology-transformation-saved-1-7bn-last-year\/, 2015."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2015.7389665"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CYCON.2014.6916397"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437806"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140549.3140555","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140549.3140555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:21Z","timestamp":1750212681000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140549.3140555"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":34,"alternative-id":["10.1145\/3140549.3140555","10.1145\/3140549"],"URL":"https:\/\/doi.org\/10.1145\/3140549.3140555","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}