{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:43:51Z","timestamp":1771613031375,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100014250","name":"Information Society Innovation Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100014250","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.1145\/3429789.3429868","type":"proceedings-article","created":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T20:52:56Z","timestamp":1606423976000},"page":"1-6","source":"Crossref","is-referenced-by-count":14,"title":["XT-Pot"],"prefix":"10.1145","author":[{"family":"Ryandy","sequence":"first","affiliation":[{"name":"Information Technology Department, Swiss German University, Tangerang, Banten, Indonesia"}]},{"given":"Charles","family":"Lim","sequence":"additional","affiliation":[{"name":"Information Technology Department, Swiss German University, Tangerang, Banten, Indonesia"}]},{"given":"Kalpin Erlangga","family":"Silaen","sequence":"additional","affiliation":[{"name":"Information Technology Department, Swiss German University, Tangerang, Banten, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2017.208"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007203.3007214"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/154193120504900304"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2497690"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the International Conference on Inventive Communication and Computational Technologies, ICICCT 2018","author":"Jamalpur Sainadh","year":"2018","unstructured":"Sainadh Jamalpur , Yamini Sai Navya , Perla Raja , Gampala Tagore , and G. Rama Koteswara Rao. 2018. Dynamic Malware Analysis Using Cuckoo Sandbox . In Proceedings of the International Conference on Inventive Communication and Computational Technologies, ICICCT 2018 . IEEE, 1056--1060. https:\/\/doi.org\/10.1109\/ICICCT. 2018 .8473346 Sainadh Jamalpur, Yamini Sai Navya, Perla Raja, Gampala Tagore, and G. Rama Koteswara Rao. 2018. Dynamic Malware Analysis Using Cuckoo Sandbox. In Proceedings of the International Conference on Inventive Communication and Computational Technologies, ICICCT 2018. IEEE, 1056--1060. https:\/\/doi.org\/10.1109\/ICICCT.2018.8473346"},{"key":"e_1_3_2_1_6_1","unstructured":"Kaspersky. 2019. What is a Trojan Virus? https:\/\/www.kaspersky.com\/resource-center\/threats\/trojans  Kaspersky. 2019. What is a Trojan Virus? https:\/\/www.kaspersky.com\/resource-center\/threats\/trojans"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOTEH.2018.8345544"},{"key":"e_1_3_2_1_8_1","volume-title":"Development of Distributed Honeypot Using Raspberry Pi. In International Conference on Information, Communication Technology and System.","author":"Lim Charles","year":"2014","unstructured":"Charles Lim , Mario Marcello , Andrew Japar , Joshua Tommy , and I Eng Kho . 2014 . Development of Distributed Honeypot Using Raspberry Pi. In International Conference on Information, Communication Technology and System. Charles Lim, Mario Marcello, Andrew Japar, Joshua Tommy, and I Eng Kho. 2014. Development of Distributed Honeypot Using Raspberry Pi. In International Conference on Information, Communication Technology and System."},{"key":"e_1_3_2_1_9_1","unstructured":"Mandiant. 2010. Indicator of Compromise. https:\/\/www.fireeye.com\/blog\/threat-research\/2010\/01\/combat-apt-sharing-indicators-compromise.html  Mandiant. 2010. Indicator of Compromise. https:\/\/www.fireeye.com\/blog\/threat-research\/2010\/01\/combat-apt-sharing-indicators-compromise.html"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2017.20"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363217"},{"key":"e_1_3_2_1_12_1","unstructured":"Mitre. 2018. Cyber Security Situation Awarenes. https:\/\/www.mitre.org\/capabilities\/cybersecurity\/situation-awareness  Mitre. 2018. Cyber Security Situation Awarenes. https:\/\/www.mitre.org\/capabilities\/cybersecurity\/situation-awareness"},{"key":"e_1_3_2_1_13_1","volume-title":"Flow-Based Programming","author":"Morrison J Paul","year":"1859","unstructured":"J Paul Morrison . 2010. Flow-Based Programming , 2 nd Edition: A New Approach to Application Development. CreateSpace . https:\/\/dl.acm.org\/doi\/book\/10.5555\/ 1859 470 J Paul Morrison. 2010. Flow-Based Programming, 2nd Edition: A New Approach to Application Development. CreateSpace. https:\/\/dl.acm.org\/doi\/book\/10.5555\/1859470","edition":"2"},{"key":"e_1_3_2_1_14_1","unstructured":"Node-Red. 2016. A visual tool for wiring the Internet-of-Things. http:\/\/nodered.org  Node-Red. 2016. A visual tool for wiring the Internet-of-Things. http:\/\/nodered.org"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2015514"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3342112"},{"key":"e_1_3_2_1_17_1","volume-title":"Cyber Security Statistics For","author":"Sec Purple","year":"2019","unstructured":"Purple Sec . 2019. Cyber Security Statistics For 2019 . https:\/\/purplesec.us\/resources\/cyber-security-statistics\/ Purple Sec. 2019. Cyber Security Statistics For 2019. https:\/\/purplesec.us\/resources\/cyber-security-statistics\/"},{"key":"e_1_3_2_1_18_1","unstructured":"Michael Sikorski and Andrew Honig. 2012. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press.  Michael Sikorski and Andrew Honig. 2012. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254322"},{"key":"e_1_3_2_1_21_1","volume-title":"Python Programming Language. In USENIX Annual Technical Conference","volume":"41","author":"Van Guido","unstructured":"Guido Van Rossum et al. 2007 . Python Programming Language. In USENIX Annual Technical Conference , Vol. 41 . USENIX, 36. https:\/\/thereaderwiki.com\/en\/Python_programming_language Guido Van Rossum et al. 2007. Python Programming Language. In USENIX Annual Technical Conference, Vol. 41. USENIX, 36. https:\/\/thereaderwiki.com\/en\/Python_programming_language"},{"key":"e_1_3_2_1_22_1","unstructured":"W3schools. 2017. JSON vs XML. https:\/\/www.w3schools.com\/js\/js_json_xml.asp  W3schools. 2017. JSON vs XML. https:\/\/www.w3schools.com\/js\/js_json_xml.asp"},{"key":"e_1_3_2_1_23_1","volume-title":"Technical Aspects of Cyber Kill Chain. In International Symposium on Security in Computing and Communication. Springer, 438--452","author":"Yadav Tarun","year":"2015","unstructured":"Tarun Yadav and Arvind Mallari Rao . 2015 . Technical Aspects of Cyber Kill Chain. In International Symposium on Security in Computing and Communication. Springer, 438--452 . https:\/\/doi.org\/10.1007\/978-3-319-22915-7_40 Tarun Yadav and Arvind Mallari Rao. 2015. Technical Aspects of Cyber Kill Chain. In International Symposium on Security in Computing and Communication. Springer, 438--452. https:\/\/doi.org\/10.1007\/978-3-319-22915-7_40"},{"key":"e_1_3_2_1_24_1","volume-title":"Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. In 29th USENIX Security Symposium USENIX Security 20","author":"Zhu Shuofei","year":"2020","unstructured":"Shuofei Zhu , Jianjun Shi , Limin Yang , Boqin Qin , Ziyi Zhang , Linhai Song , and Gang Wang . 2020 . Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. In 29th USENIX Security Symposium USENIX Security 20 . USENIX Association. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/zhu Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, and Gang Wang. 2020. Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. In 29th USENIX Security Symposium USENIX Security 20. USENIX Association. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/zhu"}],"event":{"name":"ICONETSI: International Conference on Engineering and Information Technology for Sustainable Industry","location":"Tangerang Indonesia","acronym":"ICONETSI"},"container-title":["Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429789.3429868","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3429789.3429868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:45Z","timestamp":1750195905000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429789.3429868"}},"subtitle":["eXposing Threat Category of Honeypot-based attacks"],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":23,"alternative-id":["10.1145\/3429789.3429868","10.1145\/3429789"],"URL":"https:\/\/doi.org\/10.1145\/3429789.3429868","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]}}}