{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:03:58Z","timestamp":1764687838170,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T00:00:00Z","timestamp":1552435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,13]]},"DOI":"10.1145\/3292006.3300024","type":"proceedings-article","created":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T12:22:04Z","timestamp":1553170924000},"page":"85-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots"],"prefix":"10.1145","author":[{"given":"Amit","family":"Tambe","sequence":"first","affiliation":[{"name":"Aalto University, Espoo, Finland"}]},{"given":"Yan Lin","family":"Aung","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Ragav","family":"Sridharan","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Mart\u00edn","family":"Ochoa","sequence":"additional","affiliation":[{"name":"Cyxtera Technologies, Coral Gables, FL, USA"}]},{"given":"Nils Ole","family":"Tippenhauer","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[{"name":"Ben Gurion University, Beer-Sheva, Israel"}]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2019,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras. http:\/\/blog. trendmicro.com\/trendlabs-security-intelligence\/ persirai-new-internet-things-iot-botnet-targets-ip-cameras\/  2017. Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras. http:\/\/blog. trendmicro.com\/trendlabs-security-intelligence\/ persirai-new-internet-things-iot-botnet-targets-ip-cameras\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2018. Unit 42 Finds New Mirai and Gafgyt IoT\/Linux Botnet Campaigns - Palo Alto Networks Blog. https:\/\/researchcenter.paloaltonetworks.com\/2018\/07\/ unit42-finds-new-mirai-gafgyt-iotlinux-botnet-campaigns\/. (Accessed on 08\/17\/2018).  2018. Unit 42 Finds New Mirai and Gafgyt IoT\/Linux Botnet Campaigns - Palo Alto Networks Blog. https:\/\/researchcenter.paloaltonetworks.com\/2018\/07\/ unit42-finds-new-mirai-gafgyt-iotlinux-botnet-campaigns\/. (Accessed on 08\/17\/2018)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCSP.2017.7944057"},{"key":"e_1_3_2_1_4_1","unstructured":"console cowboys. 2012. Trendnet Camera (Multiple Products) - Remote Security Bypass. https:\/\/www.exploit-db.com\/exploits\/ 36680\/.  console cowboys. 2012. Trendnet Camera (Multiple Products) - Remote Security Bypass. https:\/\/www.exploit-db.com\/exploits\/ 36680\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920276"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055186.3055192"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813086"},{"key":"e_1_3_2_1_9_1","unstructured":"IP Intelligence. 2018. Free Proxy \/ VPN \/ TOR \/ Bad IP Detection Service via API and Web Interface | IP Intelligence. https:\/\/ getipintel.net\/. (Accessed on 01\/03\/2017).  IP Intelligence. 2018. Free Proxy \/ VPN \/ TOR \/ Bad IP Detection Service via API and Web Interface | IP Intelligence. https:\/\/ getipintel.net\/. (Accessed on 01\/03\/2017)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.04.074"},{"key":"e_1_3_2_1_11_1","unstructured":"Pierre Kim. 2017. Multiple vulnerabilities found in Wireless IP Camera (P2P) WIFICAM cameras and vulnerabilities in custom http server. https:\/\/pierrekim. github.io\/blog\/2017-03-08-camera-goahead-0day.html# pre-auth-info-leak-goahead.  Pierre Kim. 2017. Multiple vulnerabilities found in Wireless IP Camera (P2P) WIFICAM cameras and vulnerabilities in custom http server. https:\/\/pierrekim. github.io\/blog\/2017-03-08-camera-goahead-0day.html# pre-auth-info-leak-goahead."},{"key":"e_1_3_2_1_12_1","first-page":"80","article-title":"DDoS in the IoT","volume":"50","author":"Kolias Constantinos","year":"2017","journal-title":"Mirai and Other Botnets. Computer"},{"key":"e_1_3_2_1_13_1","unstructured":"Brian Krebs. 2016. KrebsOnSecurity Hit With Record DDoS. https:\/\/krebsonsecurity.com\/2016\/09\/ krebsonsecurity-hit-with-record-ddos\/.  Brian Krebs. 2016. KrebsOnSecurity Hit With Record DDoS. https:\/\/krebsonsecurity.com\/2016\/09\/ krebsonsecurity-hit-with-record-ddos\/."},{"volume-title":"Proceedings of Blackhat.","year":"2017","author":"Luo Tongbo","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380790.2380805"},{"volume-title":"Towards a definition of the Internet of Things (IoT)","year":"2015","author":"Minerva Roberto","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1233341.1233399"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997469"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.522"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JISIC.2014.43"},{"volume-title":"Virtual honeypots: from botnet tracking to intrusion detection","author":"Provos Niels","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","unstructured":"Shodan Project. 2017. Shodan. https:\/\/www.shodan.io\/. (Accessed on 10\/18\/2017).  Shodan Project. 2017. Shodan. https:\/\/www.shodan.io\/. (Accessed on 10\/18\/2017)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939925"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347956"},{"volume-title":"Up 31 Percent From","year":"2016","author":"van der Meulen Rob","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","unstructured":"Yegenshen. 2017. IoT_reaper: A Rappid Spreading New IoT Botnet. http:\/\/blog.netlab.360.com\/iot_ reaper-a-rappid-spreading-new-iot-botnet-en\/.  Yegenshen. 2017. IoT_reaper: A Rappid Spreading New IoT Botnet. http:\/\/blog.netlab.360.com\/iot_ reaper-a-rappid-spreading-new-iot-botnet-en\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"}],"event":{"name":"CODASPY '19: Ninth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Richardson Texas USA","acronym":"CODASPY '19"},"container-title":["Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292006.3300024","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292006.3300024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:02Z","timestamp":1750208522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292006.3300024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,13]]},"references-count":27,"alternative-id":["10.1145\/3292006.3300024","10.1145\/3292006"],"URL":"https:\/\/doi.org\/10.1145\/3292006.3300024","relation":{},"subject":[],"published":{"date-parts":[[2019,3,13]]},"assertion":[{"value":"2019-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}