{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T21:14:49Z","timestamp":1768425289600,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["01IS14009E"],"award-info":[{"award-number":["01IS14009E"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3230839","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Towards an Automatic Generation of Low-Interaction Web Application Honeypots"],"prefix":"10.1145","author":[{"given":"Marius","family":"Musch","sequence":"first","affiliation":[{"name":"TU Braunschweig"}]},{"given":"Martin","family":"H\u00e4rterich","sequence":"additional","affiliation":[{"name":"SAP Security Research"}]},{"given":"Martin","family":"Johns","sequence":"additional","affiliation":[{"name":"TU Braunschweig"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"NDSS","author":"Cui Weidong","year":"2006","unstructured":"Weidong Cui , Vern Paxson , Nicholas Weaver , and Randy H Katz . Protocol-independent adaptive replay of application dialog . In NDSS , 2006 . Weidong Cui, Vern Paxson, Nicholas Weaver, and Randy H Katz. Protocol-independent adaptive replay of application dialog. In NDSS, 2006."},{"key":"e_1_3_2_1_2_1","volume-title":"Diff strategies. {online}, https:\/\/neil.fraser.name\/writing\/diff\/","author":"Fraser Neil","year":"2006","unstructured":"Neil Fraser . Diff strategies. {online}, https:\/\/neil.fraser.name\/writing\/diff\/ , 2006 . Neil Fraser. Diff strategies. {online}, https:\/\/neil.fraser.name\/writing\/diff\/, 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.49"},{"key":"e_1_3_2_1_4_1","unstructured":"Eric Limer. How hackers wrecked the internet using dvrs and webcams. {online} http:\/\/www.popularmechanics.com\/technology\/infrastructure\/a23504\/mirai-botnet-internet-of-things-ddos-attack\/ October 2016.  Eric Limer. How hackers wrecked the internet using dvrs and webcams. {online} http:\/\/www.popularmechanics.com\/technology\/infrastructure\/a23504\/mirai-botnet-internet-of-things-ddos-attack\/ October 2016."},{"key":"e_1_3_2_1_5_1","unstructured":"Ryan McGeehan and Greg Smith. Google hack honeypot. {online} http:\/\/ghh.sourceforge.net 2005.  Ryan McGeehan and Greg Smith. Google hack honeypot. {online} http:\/\/ghh.sourceforge.net 2005."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380151102"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1233341.1233399"},{"key":"e_1_3_2_1_8_1","first-page":"104","volume-title":"Proceedings of the International Conference on Security and Management (SAM)","author":"Mphago B","year":"2015","unstructured":"B Mphago , O Bagwasi , B Phofuetsile , and H Hlomani . Deception in dynamic web application honeypots: Case of glastopf . In Proceedings of the International Conference on Security and Management (SAM) , page 104 , 2015 . B Mphago, O Bagwasi, B Phofuetsile, and H Hlomani. Deception in dynamic web application honeypots: Case of glastopf. In Proceedings of the International Conference on Security and Management (SAM), page 104, 2015."},{"key":"e_1_3_2_1_9_1","volume-title":"A generic toolkit for converting web applications into high-interaction honeypots","author":"Mueter Michael","year":"2008","unstructured":"Michael Mueter , Felix Freiling , Thorsten Holz , and Jeanna Matthews . A generic toolkit for converting web applications into high-interaction honeypots . University of Mannheim , 280, 2008 . Michael Mueter, Felix Freiling, Thorsten Holz, and Jeanna Matthews. A generic toolkit for converting web applications into high-interaction honeypots. University of Mannheim, 280, 2008."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01840446"},{"key":"e_1_3_2_1_11_1","volume-title":"RR-03-082","author":"Pouget Fabien","year":"2003","unstructured":"Fabien Pouget and Marc Dacier . White paper: Honeypot, honeynet: A comparative survey. Technical report , RR-03-082 , Institut Eurecom , 2003 . Fabien Pouget and Marc Dacier. White paper: Honeypot, honeynet: A comparative survey. Technical report, RR-03-082, Institut Eurecom, 2003."},{"key":"e_1_3_2_1_12_1","volume-title":"Dshield web honeypot project. {online}, https:\/\/sites.google.com\/site\/webhoneypotsite","author":"Project Shield","year":"2011","unstructured":"D Shield Project . Dshield web honeypot project. {online}, https:\/\/sites.google.com\/site\/webhoneypotsite , 2011 . DShield Project. Dshield web honeypot project. {online}, https:\/\/sites.google.com\/site\/webhoneypotsite, 2011."},{"key":"e_1_3_2_1_13_1","unstructured":"HiHAT Project. High-interaction honeypot analysis tool. {online} http:\/\/hihat.sourceforge.net 2007.  HiHAT Project. High-interaction honeypot analysis tool. {online} http:\/\/hihat.sourceforge.net 2007."},{"key":"e_1_3_2_1_14_1","volume-title":"Pearson Education","author":"Provos Niels","year":"2007","unstructured":"Niels Provos and Thorsten Holz . Virtual honeypots: from botnet tracking to intrusion detection . Pearson Education , 2007 . Niels Provos and Thorsten Holz. Virtual honeypots: from botnet tracking to intrusion detection. Pearson Education, 2007."},{"key":"e_1_3_2_1_15_1","first-page":"4","article-title":"Know your tools: Glastopf-a dynamic, low-interaction web application honeypot","author":"Rist Lukas","year":"2010","unstructured":"Lukas Rist , Sven Vetsch , Marcel Kossin , and Michael Mauer . Know your tools: Glastopf-a dynamic, low-interaction web application honeypot . The Honeynet Project , 4 , 2010 . Lukas Rist, Sven Vetsch, Marcel Kossin, and Michael Mauer. Know your tools: Glastopf-a dynamic, low-interaction web application honeypot. The Honeynet Project, 4, 2010.","journal-title":"The Honeynet Project"},{"key":"e_1_3_2_1_16_1","first-page":"171","volume-title":"USENIX Security Symposium","author":"Small Sam","year":"2008","unstructured":"Sam Small , Joshua Mason , Fabian Monrose , Niels Provos , and Adam Stubblefield . To catch a predator: A natural language approach for eliciting malicious payloads . In USENIX Security Symposium , pages 171 -- 184 , 2008 . Sam Small, Joshua Mason, Fabian Monrose, Niels Provos, and Adam Stubblefield. To catch a predator: A natural language approach for eliciting malicious payloads. In USENIX Security Symposium, pages 171--184, 2008."},{"key":"e_1_3_2_1_17_1","volume-title":"Breaking honeypots for fun and profit. {online}, https:\/\/media.ccc.de\/v\/32c3-7277-breaking_honeypots_for_fun_and_profit","author":"Sysman Dean","year":"2015","unstructured":"Dean Sysman , Gadi Evron , and Itamar Sher . Breaking honeypots for fun and profit. {online}, https:\/\/media.ccc.de\/v\/32c3-7277-breaking_honeypots_for_fun_and_profit , 2015 . Dean Sysman, Gadi Evron, and Itamar Sher. Breaking honeypots for fun and profit. {online}, https:\/\/media.ccc.de\/v\/32c3-7277-breaking_honeypots_for_fun_and_profit, 2015."}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","location":"Hamburg Germany","acronym":"ARES 2018","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"]},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230839","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3230839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:30Z","timestamp":1750208250000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":17,"alternative-id":["10.1145\/3230833.3230839","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3230839","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}