{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:57Z","timestamp":1750221237502,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1618631"],"award-info":[{"award-number":["CNS-1618631"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3268966.3268971","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"69-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Ensuring Deception Consistency for FTP Services Hardened against Advanced Persistent Threats"],"prefix":"10.1145","author":[{"given":"Zhan","family":"Shu","sequence":"first","affiliation":[{"name":"Binghamton University, State University of New York, Binghamton, NY, USA"}]},{"given":"Guanhua","family":"Yan","sequence":"additional","affiliation":[{"name":"Binghamton University, State University of New York, Binghamton, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"unstructured":"https:\/\/www.equifaxsecurity2017.com\/.  https:\/\/www.equifaxsecurity2017.com\/.","key":"e_1_3_2_1_1_1"},{"unstructured":"Bftpd. http:\/\/bftpd.sourceforge.net\/.  Bftpd. http:\/\/bftpd.sourceforge.net\/.","key":"e_1_3_2_1_2_1"},{"unstructured":"CRIU. https:\/\/criu.org\/.  CRIU. https:\/\/criu.org\/.","key":"e_1_3_2_1_3_1"},{"unstructured":"CVE Details. https:\/\/www.cvedetails.com\/.  CVE Details. https:\/\/www.cvedetails.com\/.","key":"e_1_3_2_1_4_1"},{"unstructured":"File Transfer Protocol. https:\/\/en.wikipedia.org\/wiki\/File_Transfer_Protocol.  File Transfer Protocol. https:\/\/en.wikipedia.org\/wiki\/File_Transfer_Protocol.","key":"e_1_3_2_1_5_1"},{"unstructured":"gFTP. https:\/\/www.gftp.org\/.  gFTP. https:\/\/www.gftp.org\/.","key":"e_1_3_2_1_6_1"},{"unstructured":"Kippo - SSH Honeypot. https:\/\/github.com\/desaster\/kippo.  Kippo - SSH Honeypot. https:\/\/github.com\/desaster\/kippo.","key":"e_1_3_2_1_7_1"},{"unstructured":"Papers from the Honeynet project. https:\/\/www.honeynet.org\/papers.  Papers from the Honeynet project. https:\/\/www.honeynet.org\/papers.","key":"e_1_3_2_1_8_1"},{"unstructured":"ProFTPD. http:\/\/www.proftpd.org\/.  ProFTPD. http:\/\/www.proftpd.org\/.","key":"e_1_3_2_1_9_1"},{"unstructured":"Scapy. http:\/\/www.secdev.org\/projects\/scapy\/.  Scapy. http:\/\/www.secdev.org\/projects\/scapy\/.","key":"e_1_3_2_1_10_1"},{"volume-title":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013--4730","year":"2013","unstructured":"CVE-2013--4730. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013--4730 , 2013 . CVE-2013--4730. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013--4730, 2013.","key":"e_1_3_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2660267.2660329"},{"unstructured":"Archlinux. Sparse file. https:\/\/wiki.archlinux.org\/index.php\/sparse_file.  Archlinux. Sparse file. https:\/\/wiki.archlinux.org\/index.php\/sparse_file.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/SECCOM.2007.4550337"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Winter USENIX Conference","author":"Cheswick B.","year":"1992","unstructured":"B. Cheswick . An evening with berferd in which a cracker is lured, endured, and studied . In Proceedings of the Winter USENIX Conference , 1992 . B. Cheswick. An evening with berferd in which a cracker is lured, endured, and studied. In Proceedings of the Winter USENIX Conference, 1992."},{"key":"e_1_3_2_1_16_1","volume-title":"The use of deception techniques: Honeypots and decoys. 3","author":"Cohen F.","year":"2006","unstructured":"F. Cohen . The use of deception techniques: Honeypots and decoys. 3 , 2006 . F. Cohen. The use of deception techniques: Honeypots and decoys. 3, 2006."},{"key":"e_1_3_2_1_17_1","volume-title":"Securing ftp with tls (rfc 4217)","author":"Ford-Hutchinson P.","year":"2005","unstructured":"P. Ford-Hutchinson . Securing ftp with tls (rfc 4217) . 2005 . P. Ford-Hutchinson. Securing ftp with tls (rfc 4217). 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/3140549.3140555"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.17487\/RFC2228"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.5555\/2994406"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 12th International Conference on Cyber Warfare and Security","author":"Jones J.","year":"2017","unstructured":"J. Jones . Cyber deception via system manipulation . In Proceedings of the 12th International Conference on Cyber Warfare and Security , 2017 . J. Jones. Cyber deception via system manipulation. In Proceedings of the 12th International Conference on Cyber Warfare and Security, 2017."},{"unstructured":"M. Korolov. Deception technology grows and evolves. https:\/\/www.csoonline.com\/article\/3113055\/security\/deception-technology-grows-and-evolves.html.  M. Korolov. Deception technology grows and evolves. https:\/\/www.csoonline.com\/article\/3113055\/security\/deception-technology-grows-and-evolves.html.","key":"e_1_3_2_1_22_1"},{"unstructured":"K. McCoy. Target to pay $18.5M for 2013 data breach that affected 41 million consumers. https:\/\/www.usatoday.com\/story\/money\/2017\/05\/23\/target-pay-185m-2013-data-breach-affected-consumers\/102063932\/.  K. McCoy. Target to pay $18.5M for 2013 data breach that affected 41 million consumers. https:\/\/www.usatoday.com\/story\/money\/2017\/05\/23\/target-pay-185m-2013-data-breach-affected-consumers\/102063932\/.","key":"e_1_3_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/1278940.1278946"},{"key":"e_1_3_2_1_25_1","volume-title":"A kernel based data capture tool","author":"Project T. H.","year":"2003","unstructured":"T. H. Project . Sebek : A kernel based data capture tool , 2003 . T. H. Project. Sebek: A kernel based data capture tool, 2003."},{"key":"e_1_3_2_1_26_1","first-page":"4","volume-title":"10th DFN-CERT Workshop","volume":"2","author":"Provos N.","year":"2003","unstructured":"N. Provos . Honeyd-a virtual honeypot daemon . In 10th DFN-CERT Workshop , Hamburg, Germany , volume 2 , page 4 , 2003 . N. Provos. Honeyd-a virtual honeypot daemon. In 10th DFN-CERT Workshop, Hamburg, Germany, volume 2, page 4, 2003."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 2nd International Conference on I-Warfare and Security (ICIW'07)","author":"Rowe N.","year":"2007","unstructured":"N. Rowe , H. Goh , S. Lim , and B. Duong . Experiments with a testbed for automated defensive deception planning for cyber-attacks . In Proceedings of the 2nd International Conference on I-Warfare and Security (ICIW'07) , 2007 . N. Rowe, H. Goh, S. Lim, and B. Duong. Experiments with a testbed for automated defensive deception planning for cyber-attacks. In Proceedings of the 2nd International Conference on I-Warfare and Security (ICIW'07), 2007."},{"key":"e_1_3_2_1_28_1","volume-title":"Deception in defense of computer systems from cyber attack. Cyber Warfare and Cyber Terrorism, page 97","author":"Rowe N. C.","year":"2007","unstructured":"N. C. Rowe . Deception in defense of computer systems from cyber attack. Cyber Warfare and Cyber Terrorism, page 97 , 2007 . N. C. Rowe. Deception in defense of computer systems from cyber attack. Cyber Warfare and Cyber Terrorism, page 97, 2007."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/INFOCOM.2016.7524602"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1109\/CNS.2017.8228642"},{"issue":"3","key":"e_1_3_2_1_31_1","volume":"5","author":"Yuill J.","year":"2006","unstructured":"J. Yuill , D. Denning , and F. Feer . Using deception to hide things from hackers: Processes, principles, and techniques. Journal of Information Warfare , 5 ( 3 ), 2006 . J. Yuill, D. Denning, and F. Feer. Using deception to hide things from hackers: Processes, principles, and techniques. Journal of Information Warfare, 5(3), 2006.","journal-title":"Journal of Information Warfare"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '18","name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada"},"container-title":["Proceedings of the 5th ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3268966.3268971","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3268966.3268971","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3268966.3268971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:20Z","timestamp":1750212440000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3268966.3268971"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":31,"alternative-id":["10.1145\/3268966.3268971","10.1145\/3268966"],"URL":"https:\/\/doi.org\/10.1145\/3268966.3268971","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}