{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:50:54Z","timestamp":1762005054514,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3268966.3268973","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"40-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Cloxy"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Fraunholz","sequence":"first","affiliation":[{"name":"German Research Center for Artificial Intelligence, Kaiserslautern, Germany"}]},{"given":"Daniel","family":"Reti","sequence":"additional","affiliation":[{"name":"German Research Center for Artificial Intelligence, Kaiserslautern, Germany"}]},{"given":"Simon","family":"Duque Anton","sequence":"additional","affiliation":[{"name":"German Research Center for Artificial Intelligence, Kaiserslautern, Germany"}]},{"given":"Hans Dieter","family":"Schotten","sequence":"additional","affiliation":[{"name":"German Research Center for Artificial Intelligence, Kaiserslautern, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/647985.743843"},{"key":"e_1_3_2_1_2_1","unstructured":"Mohammed H. Almeshekah. 2015. Using Deception to Enhance Security: A Taxonomy Model and Novel Uses . Ph.D. thesis. Purdue University Department of Computer Sciences .  Mohammed H. Almeshekah. 2015. Using Deception to Enhance Security: A Taxonomy Model and Novel Uses . Ph.D. thesis. Purdue University Department of Computer Sciences ."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2683467.2683482"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660329"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_27"},{"key":"e_1_3_2_1_6_1","unstructured":"John B. Bell and Barton Whaley. 1991. Cheating and deception repr ed.). Transaction Publ New Brunswick.  John B. Bell and Barton Whaley. 1991. Cheating and deception repr ed.). Transaction Publ New Brunswick."},{"volume-title":"International Conference on Intelligence and Security Informatics","year":"2011","author":"Bercovitch Maya","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"Stephen W.Stephen W.Boyd Boyd and Angelos D.Angelos D.Keromytis Keromytis. {n. d.}. SQLrand: Preventing SQL Injection Attacks. ({n. d.}).  Stephen W.Stephen W.Boyd Boyd and Angelos D.Angelos D.Keromytis Keromytis. {n. d.}. SQLrand: Preventing SQL Injection Attacks. ({n. d.})."},{"key":"e_1_3_2_1_9_1","unstructured":"Alexander Bredo. 2014. honeypot-camera. github.com\/alexbredo\/honeypot-camera  Alexander Bredo. 2014. honeypot-camera. github.com\/alexbredo\/honeypot-camera"},{"volume-title":"Dionaea: A Malware Capturing Honeypot.","year":"2009","author":"Project Carnivore","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"CIRT. 2001. Nikto2. https:\/\/cirt.net\/Nikto2  CIRT. 2001. Nikto2. https:\/\/cirt.net\/Nikto2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2857070.2857152"},{"key":"e_1_3_2_1_13_1","unstructured":"Aldo Cortesi Shadab Zafar David Weinstein Doug Freed Thomas Kriechbaumer Matthew Shao Maximilian Hils and Ujjwal Verma. 2012. Man-in-the-Middle Proxy. https:\/\/mitmproxy.org\/  Aldo Cortesi Shadab Zafar David Weinstein Doug Freed Thomas Kriechbaumer Matthew Shao Maximilian Hils and Ujjwal Verma. 2012. Man-in-the-Middle Proxy. https:\/\/mitmproxy.org\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Mark Dowd John McDonald and Justin Schuh. 2007. The art of software security assessment: Identifying and preventing software vulnerabilities .Addison-Wesley Upper Saddle River N.J.   Mark Dowd John McDonald and Justin Schuh. 2007. The art of software security assessment: Identifying and preventing software vulnerabilities .Addison-Wesley Upper Saddle River N.J."},{"volume-title":"HoneyThing. Proceedings of the International Conference on Information Security and Cryptology","year":"2016","author":"Erdem \u00d6mer","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"Europol. 2016. Internet Organized Crime Threat Assessment. https:\/\/www.europol.europa.eu\/activities-services\/main-reports\/internet-organised-crime-threat-assessment-iocta-2016  Europol. 2016. Internet Organized Crime Threat Assessment. https:\/\/www.europol.europa.eu\/activities-services\/main-reports\/internet-organised-crime-threat-assessment-iocta-2016"},{"volume-title":"Crime Report","year":"2015","author":"FBI.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"Daniel Fraunholz Simon Duque Anton Christoph Lipps Daniel Reti Daniel Krohmer Matthias Tammen and Hans Dieter Schotten. 2018a. Demystifying Deception Technology: A Survey. ArXiv e-prints (2018).  Daniel Fraunholz Simon Duque Anton Christoph Lipps Daniel Reti Daniel Krohmer Matthias Tammen and Hans Dieter Schotten. 2018a. Demystifying Deception Technology: A Survey. ArXiv e-prints (2018)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2018.8560675"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328709"},{"volume-title":"Distraction and Obfuscation. International Conference on Computing, Networking and Communications","year":"2018","author":"Fraunholz Daniel","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140549.3140555"},{"key":"e_1_3_2_1_23_1","unstructured":"Michae Hoglund and Shawn Bracken. 2011. Inoculator and antibody for computer security.  Michae Hoglund and Shawn Bracken. 2011. Inoculator and antibody for computer security."},{"key":"e_1_3_2_1_24_1","unstructured":"Honeynet Project. 2003. Sebek. https:\/\/projects.honeynet.org\/sebek\/  Honeynet Project. 2003. Sebek. https:\/\/projects.honeynet.org\/sebek\/"},{"key":"e_1_3_2_1_25_1","unstructured":"Honeynet Project. 2014. Bifrozt. https:\/\/github.com\/Bifrozt\/bifrozt-ansible  Honeynet Project. 2014. Bifrozt. https:\/\/github.com\/Bifrozt\/bifrozt-ansible"},{"key":"e_1_3_2_1_26_1","unstructured":"Eric M. Hutchins Michael J. Cloppert and Rohan M. Amin. {n. d.}. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. https:\/\/www.lockheedmartin.com\/content\/dam\/lockheed\/data\/corporate\/documents\/LM-White-Paper-Intel-Driven-Defense.pdf  Eric M. Hutchins Michael J. Cloppert and Rohan M. Amin. {n. d.}. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. https:\/\/www.lockheedmartin.com\/content\/dam\/lockheed\/data\/corporate\/documents\/LM-White-Paper-Intel-Driven-Defense.pdf"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516671"},{"key":"e_1_3_2_1_28_1","unstructured":"Juniper Research. 2015. THE FUTURE OF CYBERCRIME & SECURITY: Financial & Corporate Threats & Mitigation 2015--2020. https:\/\/www.juniperresearch.com\/researchstore\/strategy-competition\/cybercrime-security\/financial-corporate-threats-mitigation  Juniper Research. 2015. THE FUTURE OF CYBERCRIME & SECURITY: Financial & Corporate Threats & Mitigation 2015--2020. https:\/\/www.juniperresearch.com\/researchstore\/strategy-competition\/cybercrime-security\/financial-corporate-threats-mitigation"},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Workshop on Cyber Security Experimentation and Test","volume":"9","author":"Lazarov Martin","year":"2016"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664252"},{"key":"e_1_3_2_1_31_1","volume-title":"IEEE Symposium on Security and Privacy","volume":"38","author":"Lin Jianbao","year":"2017"},{"key":"e_1_3_2_1_32_1","unstructured":"Martin Nawrocki Matthias W\"ahlisch Thomas Schmidt Christian Keil and Jochen Sch\u00f6nfelder. 2016. A Survey on Honeypot Software and Data Analysis. CoRR (2016).  Martin Nawrocki Matthias W\"ahlisch Thomas Schmidt Christian Keil and Jochen Sch\u00f6nfelder. 2016. A Survey on Honeypot Software and Data Analysis. CoRR (2016)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140549.3140559"},{"key":"e_1_3_2_1_34_1","unstructured":"Thomas Nicholson. 2016. HonSSH. github.com\/tnich\/honssh  Thomas Nicholson. 2016. HonSSH. github.com\/tnich\/honssh"},{"key":"e_1_3_2_1_35_1","unstructured":"A. Ofir and F. Yarochkin. 2003. Xprobe2 - A Fuzzy Approach to Remote Active Operating System Fingerprinting. (2003).  A. Ofir and F. Yarochkin. 2003. Xprobe2 - A Fuzzy Approach to Remote Active Operating System Fingerprinting. (2003)."},{"key":"e_1_3_2_1_36_1","unstructured":"Michel Oosterhof. 2014. Cowrie. http:\/\/www.micheloosterhof.com\/cowrie\/  Michel Oosterhof. 2014. Cowrie. http:\/\/www.micheloosterhof.com\/cowrie\/"},{"key":"e_1_3_2_1_37_1","unstructured":"OpenBSD-Project. 2017. SpamD. man.openbsd.org\/cgi-bin\/man.cgi\/OpenBSD-current\/man8\/spamd.8  OpenBSD-Project. 2017. SpamD. man.openbsd.org\/cgi-bin\/man.cgi\/OpenBSD-current\/man8\/spamd.8"},{"key":"e_1_3_2_1_38_1","unstructured":"OWASP. 2008. Dirbuster Project. https:\/\/www.owasp.org\/index.php\/Category:OWASP_DirBuster_Project  OWASP. 2008. Dirbuster Project. https:\/\/www.owasp.org\/index.php\/Category:OWASP_DirBuster_Project"},{"key":"e_1_3_2_1_39_1","volume-title":"IoTPOT: Analysing the Rise of IoT Compromises. USENIX Workshop on Offensive Technologies","volume":"9","author":"Pa Pa Yin Minn","year":"2015"},{"volume-title":"USENIX Security Symposium","year":"2004","author":"Provos N.","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","unstructured":"Lukas Rist Johnny Vestergaard Daniel Haslinger Andrea Pasquale and John Smith. 2015. Conpot ICS\/SCADA Honeypot.  Lukas Rist Johnny Vestergaard Daniel Haslinger Andrea Pasquale and John Smith. 2015. Conpot ICS\/SCADA Honeypot."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Neil C. Rowe. 2007. Deception in Defense of Computer Systems from Cyber Attack. In Cyber Warfare and Cyber Terrorism Lech Janczewski and Andrew Colarik (Eds.). IGI Global 97--104.  Neil C. Rowe. 2007. Deception in Defense of Computer Systems from Cyber Attack. In Cyber Warfare and Cyber Terrorism Lech Janczewski and Andrew Colarik (Eds.). IGI Global 97--104.","DOI":"10.4018\/978-1-59140-991-5.ch013"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.2.2.25-36"},{"key":"e_1_3_2_1_44_1","unstructured":"Daniel Sokolov. 2018. Orakel im Code: Reverse-Engineering l\"asst sich live aufdecken.  Daniel Sokolov. 2018. Orakel im Code: Reverse-Engineering l\"asst sich live aufdecken."},{"volume-title":"Honeypots: Tracking Hackers .","year":"2003","author":"Spitzner Lance","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","unstructured":"Upi Tamminen. 2009. Kippo SSH Medium Interaction Honeypot. https:\/\/github.com\/desaster\/kippo  Upi Tamminen. 2009. Kippo SSH Medium Interaction Honeypot. https:\/\/github.com\/desaster\/kippo"},{"key":"e_1_3_2_1_47_1","unstructured":"The Honeynet Project. 2010. Know Your Tools: Qebek -- Conceal the Monitoring. honeynet.org\/papers\/KYT_qebek  The Honeynet Project. 2010. Know Your Tools: Qebek -- Conceal the Monitoring. honeynet.org\/papers\/KYT_qebek"},{"key":"e_1_3_2_1_48_1","article-title":"The Art of Port Scanning","volume":"7","author":"Vaskovich Fyodor","year":"1997","journal-title":"Phrack Magazine"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CYCON.2014.6916397"},{"key":"e_1_3_2_1_50_1","unstructured":"Adam York. 2014. Garble.  Adam York. 2014. Garble."},{"key":"e_1_3_2_1_51_1","unstructured":"James Joseph Yuill. 2007. Defensive Computer-Security Deception Operations: Processes Principles and Techniques . Ph.D. Dissertation. North Carolina State University .  James Joseph Yuill. 2007. Defensive Computer-Security Deception Operations: Processes Principles and Techniques . Ph.D. Dissertation. North Carolina State University ."},{"key":"e_1_3_2_1_52_1","unstructured":"M. Zalewski. 2012. p0f v3: Passive fingerprinter. (2012).  M. Zalewski. 2012. p0f v3: Passive fingerprinter. (2012)."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 5th ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3268966.3268973","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3268966.3268973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:20Z","timestamp":1750212440000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3268966.3268973"}},"subtitle":["A Context-aware Deception-as-a-Service Reverse Proxy for Web Services"],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":52,"alternative-id":["10.1145\/3268966.3268973","10.1145\/3268966"],"URL":"https:\/\/doi.org\/10.1145\/3268966.3268973","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}