{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T09:53:13Z","timestamp":1765619593343,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T00:00:00Z","timestamp":1546041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,29]]},"DOI":"10.1145\/3301551.3301586","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"134-139","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Deployment of IoT-based honeynet model"],"prefix":"10.1145","author":[{"given":"Zakariya","family":"Ammar","sequence":"first","affiliation":[{"name":"Naif Arab University for security sciences (NAUSS), Riyadh, Saudi Arabia"}]},{"given":"Ahmad","family":"AlSharif","sequence":"additional","affiliation":[{"name":"Naif Arab University for security sciences (NAUSS), Riyadh, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"IDC. New IDC Spending Guide. 2017 {cited 2018 16 March }; Available from: https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS43165817.  IDC. New IDC Spending Guide. 2017 {cited 2018 16 March }; Available from: https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS43165817."},{"key":"e_1_3_2_1_2_1","volume":"201","author":"Fan W.","unstructured":"Fan , W. , et al. , Enabling an Anatomic View to Investigate Honeypot Systems: A Survey. IEEE Systems Journal , 201 7. Fan, W., et al., Enabling an Anatomic View to Investigate Honeypot Systems: A Survey. IEEE Systems Journal, 2017.","journal-title":"IEEE Systems Journal"},{"key":"e_1_3_2_1_3_1","volume-title":"Active Defence System for Network Security- Honeypot. Advances in Computer Science and Information Technology (ACSIT)","author":"Pandya S.S.","year":"2015","unstructured":"Pandya , S.S. , Active Defence System for Network Security- Honeypot. Advances in Computer Science and Information Technology (ACSIT) , 2015 . 2(4): p. 383--386. Pandya, S.S., Active Defence System for Network Security- Honeypot. Advances in Computer Science and Information Technology (ACSIT), 2015. 2(4): p. 383--386."},{"key":"e_1_3_2_1_4_1","unstructured":"reserved. -.C.I.A.r. Cymmetria releases honeypots for two Oracle vulnerabilities. {Online} 2018 2018 {cited 2018 21 Feb}; Available from: https:\/\/cymmetria.com\/blog\/honeypots-for-oracle-vulnerabilities\/.  reserved. -.C.I.A.r. Cymmetria releases honeypots for two Oracle vulnerabilities. {Online} 2018 2018 {cited 2018 21 Feb}; Available from: https:\/\/cymmetria.com\/blog\/honeypots-for-oracle-vulnerabilities\/."},{"key":"e_1_3_2_1_5_1","volume-title":"A survey on honeypot software and data analysis. arXiv preprint arXiv:1608.06249","author":"Nawrocki M.","year":"2016","unstructured":"Nawrocki , M. , et al. , A survey on honeypot software and data analysis. arXiv preprint arXiv:1608.06249 , 2016 . Nawrocki, M., et al., A survey on honeypot software and data analysis. arXiv preprint arXiv:1608.06249, 2016."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745468"},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"EMU","author":"Pa Y.M.P.","year":"2015","unstructured":"Pa , Y.M.P. , et al., Io TPOT : analysing the rise of IoT compromises . EMU , 2015 . 9: p. 1 . Pa, Y.M.P., et al., IoTPOT: analysing the rise of IoT compromises. EMU, 2015. 9: p. 1."},{"key":"e_1_3_2_1_8_1","first-page":"07","volume":"201","author":"Sharma A.","unstructured":"Sharma , A. , Honeypots in Network Security. International Journal of Technical Research and Applications , 201 3. 1(5): p. 07 -- 12 . Sharma, A., Honeypots in Network Security. International Journal of Technical Research and Applications, 2013. 1(5): p. 07--12.","journal-title":"Applications"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07941-7_12"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39207-3_11"},{"key":"e_1_3_2_1_11_1","volume-title":"2018","author":"Group","year":"2018","unstructured":"Group , M.M. internet word stats . 2018 February 18, 2018 {cited 2018 18 Feb}; Available from: https:\/\/www.internetworldstats.com\/top20.htm. Group, M.M. internet word stats. 2018 February 18, 2018 {cited 2018 18 Feb}; Available from: https:\/\/www.internetworldstats.com\/top20.htm."},{"key":"e_1_3_2_1_12_1","first-page":"1","volume":"201","author":"Harale S.","unstructured":"Harale , S. , S. Tambe , and G. Kothawale , Detection and analysis of network & application layer attacks using honey pot with system security features. Int. J. Adv. Res. Ideas Innovations Technol , 201 7. 3: p. 1 -- 4 . Harale, S., S. Tambe, and G. Kothawale, Detection and analysis of network & application layer attacks using honey pot with system security features. Int. J. Adv. Res. Ideas Innovations Technol, 2017. 3: p. 1--4.","journal-title":"Int. J. Adv. Res. Ideas Innovations Technol"},{"key":"e_1_3_2_1_13_1","volume-title":"Exploitation of PDF Reader Vulnerabilities using Metasploit Tool","author":"Choudhary R.","year":"2017","unstructured":"Choudhary , R. and M. Khurana , Exploitation of PDF Reader Vulnerabilities using Metasploit Tool . 2017 . Choudhary, R. and M. Khurana, Exploitation of PDF Reader Vulnerabilities using Metasploit Tool. 2017."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2978178.2978184"},{"key":"e_1_3_2_1_15_1","first-page":"2395","volume":"201","author":"Karthikeyan R.","unstructured":"Karthikeyan , R. , et al. , Advanced Honey Pot Architecture for Network Threats Quantification. the international journal of Engineering and Techniques , 201 7. 3(2): p. 2395 -- 1303 . Karthikeyan, R., et al., Advanced Honey Pot Architecture for Network Threats Quantification. the international journal of Engineering and Techniques, 2017. 3(2): p. 2395--1303.","journal-title":"Advanced Honey Pot Architecture for Network Threats Quantification. the international journal of Engineering and Techniques"},{"volume-title":"Tracing Cyber Threats","year":"2017","key":"e_1_3_2_1_16_1","unstructured":"SEHGAL, R. , Tracing Cyber Threats . 2017 , INDIAN INSTITUTE OF TECHNOLOGY , KANPUR. SEHGAL, R., Tracing Cyber Threats. 2017, INDIAN INSTITUTE OF TECHNOLOGY, KANPUR."},{"key":"e_1_3_2_1_17_1","volume-title":"Detection and classification of Web robots with honeypots","author":"McKenna S.F.","year":"2016","unstructured":"McKenna , S.F. , Detection and classification of Web robots with honeypots . 2016 . McKenna, S.F., Detection and classification of Web robots with honeypots. 2016."},{"key":"e_1_3_2_1_18_1","first-page":"153","volume":"201","author":"Cheminod M.","unstructured":"Cheminod , M. , et al. , Detection of attacks based on known vulnerabilities in industrial networked systems. Journal of Information Security and Applications , 201 7. 34: p. 153 -- 165 . Cheminod, M., et al., Detection of attacks based on known vulnerabilities in industrial networked systems. Journal of Information Security and Applications, 2017. 34: p. 153--165.","journal-title":"Journal of Information Security and Applications"},{"key":"e_1_3_2_1_19_1","volume-title":"Freie Universitat Berlin","author":"Marcin Nawrocki M.W.","year":"2016","unstructured":"Marcin Nawrocki , M.W. , Thomas C. Schmidt , Christian Keil, Jochen Schonfelder , Freie Universitat Berlin , Berlin, Germany , Distinction between security concept Based on areas of operation, A.s.o.h.s.a.d. analysis, Editor. 2016 , arxiv.org: arxiv.org. p. Table I DISTINCTION BETWEEN SECURITY CONCEPTS BASED ON AREAS OF OPERATION. Marcin Nawrocki, M.W., Thomas C. Schmidt, Christian Keil, Jochen Schonfelder, Freie Universitat Berlin, Berlin, Germany, Distinction between security concept Based on areas of operation, A.s.o.h.s.a.d. analysis, Editor. 2016, arxiv.org: arxiv.org. p. Table I DISTINCTION BETWEEN SECURITY CONCEPTS BASED ON AREAS OF OPERATION."},{"key":"e_1_3_2_1_20_1","volume-title":"Overview of Internet of Things. {Online} 2018","author":"Developers G.","year":"2018","unstructured":"Developers , G. Overview of Internet of Things. {Online} 2018 March 19, 2018 . {cited 2018 21 April 2018}; Google Cloud }. Available from: https:\/\/cloud.google.com\/solutions\/iot-overview. Developers, G. Overview of Internet of Things. {Online} 2018 March 19, 2018. {cited 2018 21 April 2018}; Google Cloud }. Available from: https:\/\/cloud.google.com\/solutions\/iot-overview."},{"key":"e_1_3_2_1_21_1","volume-title":"Turning internet of things (iot) into internet of vulnerabilities (iov): Iot botnets. arXiv preprint arXiv:1702.03681","author":"Angrishi K.","year":"2017","unstructured":"Angrishi , K. , Turning internet of things (iot) into internet of vulnerabilities (iov): Iot botnets. arXiv preprint arXiv:1702.03681 , 2017 . Angrishi, K., Turning internet of things (iot) into internet of vulnerabilities (iov): Iot botnets. arXiv preprint arXiv:1702.03681, 2017."},{"key":"e_1_3_2_1_22_1","volume-title":"HoneyIo4: the construction of a virtual, low-interaction IoT Honeypot","author":"Guerra Manzanares A.","year":"2017","unstructured":"Guerra Manzanares , A. , HoneyIo4: the construction of a virtual, low-interaction IoT Honeypot . 2017 , Universitat Polit\u00e8cnica de Catalunya . Guerra Manzanares, A., HoneyIo4: the construction of a virtual, low-interaction IoT Honeypot. 2017, Universitat Polit\u00e8cnica de Catalunya."},{"key":"e_1_3_2_1_23_1","volume-title":"Techniques for detecting compromised IoT devices","author":"Van der Elzen I.","year":"2017","unstructured":"Van der Elzen , I. and J. van Heugten , Techniques for detecting compromised IoT devices . University of Amsterdam , 2017 . Van der Elzen, I. and J. van Heugten, Techniques for detecting compromised IoT devices. University of Amsterdam, 2017."},{"key":"e_1_3_2_1_24_1","volume-title":"Detection of Unauthorized IoT Devices Using Machine Learning Techniques. arXiv preprint arXiv:1709.04647","author":"Meidan Y.","year":"2017","unstructured":"Meidan , Y. , et al. , Detection of Unauthorized IoT Devices Using Machine Learning Techniques. arXiv preprint arXiv:1709.04647 , 2017 . Meidan, Y., et al., Detection of Unauthorized IoT Devices Using Machine Learning Techniques. arXiv preprint arXiv:1709.04647, 2017."},{"key":"e_1_3_2_1_25_1","volume-title":"Deployment of honeypots as proactive detection tools for monitoring cyber related incidences","author":"Ogada P.O.","year":"2015","unstructured":"Ogada , P.O. , Deployment of honeypots as proactive detection tools for monitoring cyber related incidences . 2015 , JOOUST. Ogada, P.O., Deployment of honeypots as proactive detection tools for monitoring cyber related incidences. 2015, JOOUST."},{"key":"e_1_3_2_1_26_1","first-page":"522","volume":"201","author":"Pa Y.M.P.","unstructured":"Pa , Y.M.P. , et al. , Iotpot: A novel honeypot for revealing current iot threats. Journal of Information Processing , 201 6. 24(3): p. 522 -- 533 . Pa, Y.M.P., et al., Iotpot: A novel honeypot for revealing current iot threats. Journal of Information Processing, 2016. 24(3): p. 522--533.","journal-title":"Journal of Information Processing"},{"key":"e_1_3_2_1_27_1","volume-title":"Deploying Dionaea on a Raspberry Pi using MHN","author":"Yee N.","year":"2015","unstructured":"Yee , N. , Deploying Dionaea on a Raspberry Pi using MHN . 25 Feb 2015 . Yee, N., Deploying Dionaea on a Raspberry Pi using MHN. 25 Feb 2015."},{"key":"e_1_3_2_1_28_1","unstructured":"ARM A.L. Raspberry Pi ArchLinux. {Online} 2018 {cited 2018 25 Feb }; archlinuxarm.org}. Available from: https:\/\/archlinuxarm.org\/platforms\/armv6\/raspberry-pi.  ARM A.L. Raspberry Pi ArchLinux. {Online} 2018 {cited 2018 25 Feb }; archlinuxarm.org}. Available from: https:\/\/archlinuxarm.org\/platforms\/armv6\/raspberry-pi."},{"key":"e_1_3_2_1_29_1","unstructured":"sourceforge.net. {Online} 2016-10-06 {cited 2018 25 feb}; 2016.10:{Honeeepi files source}. Available from: https:\/\/sourceforge.net\/projects\/honeeepi\/files\/.  sourceforge.net. {Online} 2016-10-06 {cited 2018 25 feb}; 2016.10:{Honeeepi files source}. Available from: https:\/\/sourceforge.net\/projects\/honeeepi\/files\/."},{"key":"e_1_3_2_1_30_1","unstructured":"Lyon G. Nmap Security 2018 {cited 2018 09 March}; Available from: https:\/\/nmap.org\/.  Lyon G. Nmap Security 2018 {cited 2018 09 March}; Available from: https:\/\/nmap.org\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Online-Domain-tools. {Online} 2018 {cited 2018 09 March}; Online Nmap Scan}. Available from: http:\/\/nmap.online-domain-tools.com\/.  Online-Domain-tools. {Online} 2018 {cited 2018 09 March}; Online Nmap Scan}. Available from: http:\/\/nmap.online-domain-tools.com\/."}],"event":{"name":"ICIT 2018: IoT and Smart City","sponsor":["The Hong Kong Polytechnic The Hong Kong Polytechnic University","TU Tianjin University"],"location":"Hong Kong Hong Kong","acronym":"ICIT 2018"},"container-title":["Proceedings of the 6th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301586","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301551.3301586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:35Z","timestamp":1750208255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301586"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,29]]},"references-count":31,"alternative-id":["10.1145\/3301551.3301586","10.1145\/3301551"],"URL":"https:\/\/doi.org\/10.1145\/3301551.3301586","relation":{},"subject":[],"published":{"date-parts":[[2018,12,29]]},"assertion":[{"value":"2018-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}