{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T02:43:49Z","timestamp":1775097829888,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T00:00:00Z","timestamp":1679616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,24]]},"DOI":"10.1145\/3592307.3592325","type":"proceedings-article","created":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T13:30:46Z","timestamp":1692019846000},"page":"109-117","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Honeypot Detection Method Based on Anomalous Requests Response Differences"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5172-9422","authenticated-orcid":false,"given":"Xingyu","family":"Chen","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2775-2056","authenticated-orcid":false,"given":"Bin","family":"Lu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7985-859X","authenticated-orcid":false,"given":"Rongbo","family":"Sun","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4108-3003","authenticated-orcid":false,"given":"Mi","family":"Jiang","sequence":"additional","affiliation":[{"name":"Cyber Security College, Information Engineering University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,8,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Preliminary study on the development of honeypot technology [J]. Information security and communication confidentiality","author":"Chuanlin Wang","year":"2008","unstructured":"Chuanlin Wang, Anning Shang. Preliminary study on the development of honeypot technology [J]. Information security and communication confidentiality, 2008(8):3."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495930"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2010.031858"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2012.738375"},{"key":"e_1_3_2_1_5_1","first-page":"134","volume-title":"An Internet-Wide View of Self-Revealing Honeypots,\" 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)","author":"Morishita","year":"2019","unstructured":"S. Morishita , \"Detect Me If You\u2026 Oh Wait. An Internet-Wide View of Self-Revealing Honeypots,\" 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), 2019, pp. 134-143."},{"key":"e_1_3_2_1_6_1","unstructured":"Srinivasa Shreyas \u201cGotta catch 'em all: a Multistage Framework for honeypot fingerprinting.\u201d ArXiv abs\/2109.10652 (2021): n. pag."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2007.381919"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-018-0252-2"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 12th USENIX Conference on Offensive Technologies (WOOT'18)","author":"Alexander Vetterl","year":"2018","unstructured":"Alexander Vetterl and Richard Clayton. 2018. Bitter harvest: systematically fingerprinting low- and medium-interaction honeypots at internet scale. In Proceedings of the 12th USENIX Conference on Offensive Technologies (WOOT'18). USENIX Association, USA, 9."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2627608"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4304\/jait.3.3.147-154"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.4304\/jait.2.2.99-108"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Omar Al-Jarrah and Ahmad Arafat \"Network Intrusion Detection System Using Neural Network Classification of Attack Behavior \" Vol. 6 No. 1 pp. 1-8 February 2015. doi:10.12720\/jait.6.1.1-8","DOI":"10.12720\/jait.6.1.1-8"},{"issue":"1","key":"e_1_3_2_1_14_1","first-page":"36","article-title":"Hasibul Alam Ratul, Md. Mahidur Rahman, Ishrat Jahan Diya, and Zunayeed-Bin Zahir, \"Performance of Machine Learning Techniques in Anomaly Detection with Basic Feature Selection Strategy - A Network Intrusion Detection System","volume":"13","author":"Md","year":"2022","unstructured":"Md. Badiuzzaman Pranto, Md. Hasibul Alam Ratul, Md. Mahidur Rahman, Ishrat Jahan Diya, and Zunayeed-Bin Zahir, \"Performance of Machine Learning Techniques in Anomaly Detection with Basic Feature Selection Strategy - A Network Intrusion Detection System,\" Journal of Advances in Information Technology, Vol. 13, No. 1, pp. 36-44, February 2022.","journal-title":"Journal of Advances in Information Technology"},{"issue":"5","key":"e_1_3_2_1_15_1","first-page":"456","article-title":"Ehlers, \"GAAINet: A Generative Adversarial Artificial Immune Network Model for Intrusion Detection in Industrial IoT Systems","volume":"13","author":"Siphesihle P.","year":"2022","unstructured":"Siphesihle P. Sithungu and Elizabeth M. Ehlers, \"GAAINet: A Generative Adversarial Artificial Immune Network Model for Intrusion Detection in Industrial IoT Systems,\" Journal of Advances in Information Technology, Vol. 13, No. 5, pp. 456-461, October 2022.","journal-title":"Journal of Advances in Information Technology"},{"issue":"5","key":"e_1_3_2_1_16_1","first-page":"524","article-title":"Statistic Approached Dynamically Detecting Security Threats and Updating a Signature-Based Intrusion Detection System's Database in NGN","volume":"13","author":"Gunay Abdiyeva-Aliyeva","year":"2022","unstructured":"Gunay Abdiyeva-Aliyeva and Mehran Hematyar, \"Statistic Approached Dynamically Detecting Security Threats and Updating a Signature-Based Intrusion Detection System's Database in NGN,\" Journal of Advances in Information Technology, Vol. 13, No. 5, pp. 524-529, October 2022.","journal-title":"Journal of Advances in Information Technology"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2616"},{"key":"e_1_3_2_1_18_1","first-page":"242","article-title":"Automated fuzz testing vulnerability mining methods for network protocols [J]","volume":"2011","author":"Weiming Li","unstructured":"Weiming Li, Aifang Zhang, Jiancai Liu, Zhitang Li. Automated fuzz testing vulnerability mining methods for network protocols [J]. Journal of Computer Science ,2011,34(02):242-255.","journal-title":"Journal of Computer Science"},{"key":"e_1_3_2_1_19_1","volume-title":"Cosine normalization: Using cosine similarity instead of dot product in neural networks [C]\/\/International Conference on Artificial Neural Networks","author":"Luo C","year":"2018","unstructured":"Luo C, Zhan J, Xue X, Cosine normalization: Using cosine similarity instead of dot product in neural networks [C]\/\/International Conference on Artificial Neural Networks. Springer, Cham, 2018: 382-391."},{"issue":"1","key":"e_1_3_2_1_20_1","first-page":"45","article-title":"Vmware distributed resource management: Design, implementation, and lessons learned [J]","volume":"1","author":"Gulati A","year":"2012","unstructured":"Gulati A, Holler A, Ji M, Vmware distributed resource management: Design, implementation, and lessons learned [J]. VMware Technical Journal, 2012, 1(1): 45-64.","journal-title":"VMware Technical Journal"},{"issue":"11","key":"e_1_3_2_1_21_1","first-page":"2250","article-title":"An ASCII value based text data encryption System [J]","volume":"3","author":"Singh U","year":"2013","unstructured":"Singh U, Garg U. An ASCII value based text data encryption System [J]. International Journal of Scientific and Research Publications, 2013, 3(11): bll 2250-3153.","journal-title":"International Journal of Scientific and Research Publications"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8201"},{"key":"e_1_3_2_1_23_1","unstructured":"CHN.Faker. Which is more scientific Chinese or American rankings? [EB\/OL]. [2022-10-04]. https:\/\/www.zhihu.com\/question\/422508480."},{"key":"e_1_3_2_1_24_1","volume-title":"SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and < 0.5 MB model size [J]. arXiv preprint arXiv:1602.07360","author":"Iandola F N","year":"2016","unstructured":"Iandola F N, Han S, Moskewicz M W, SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and < 0.5 MB model size [J]. arXiv preprint arXiv:1602.07360, 2016."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcard.2016.03.166"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1945"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2616"},{"key":"e_1_3_2_1_28_1","volume-title":"Ed, QUIC: A UDP-Based Multiplexed and Secure Transport, draft-ietf-quic-transport-27","author":"Iyengar","year":"2020","unstructured":"J. Iyengar, Ed, QUIC: A UDP-Based Multiplexed and Secure Transport, draft-ietf-quic-transport-27, 21 February 2020; https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-quic-transport-27"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7234"},{"issue":"3","key":"e_1_3_2_1_30_1","first-page":"4802","volume":"5","author":"Kalita L.","year":"2014","unstructured":"Kalita L. Socket programming [J]. International Journal of Computer Science and Information Technologies, 2014, 5(3): 4802-4807.","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"e_1_3_2_1_31_1","unstructured":"Pazzi Robotics. Express Honeypot [EB\/OL]. 2022.1 [2022.8.31]. https:\/\/github.com\/christophe77\/express-honeypot."},{"key":"e_1_3_2_1_32_1","unstructured":"Kayos. HellPot [EB\/OL]. 2022.4 [2022.8.31]. https:\/\/github.com\/yunginnanet\/HellPot."},{"key":"e_1_3_2_1_33_1","unstructured":"Markus Schmall. NodePot [EB\/OL]. 2015.8 [2022.8.31]. https:\/\/github.com\/schmalle\/Nodepot."},{"key":"e_1_3_2_1_34_1","volume-title":"An API honeypot for DDoS and XSS analysis [C]\/\/2017 IEEE MIT Undergraduate Research Technology Conference (URTC)","author":"Leaden G","year":"2017","unstructured":"Leaden G, Zimmermann M, DeCusatis C, An API honeypot for DDoS and XSS analysis [C]\/\/2017 IEEE MIT Undergraduate Research Technology Conference (URTC). IEEE, 2017: 1-4."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.2478\/cait-2012-0009"},{"key":"e_1_3_2_1_36_1","unstructured":"Brady Sullivan. Drupot [EB\/OL]. 2020.6 [2022.8.31]. https:\/\/github.com\/d1str0\/drupot."},{"key":"e_1_3_2_1_37_1","unstructured":"Willem Mouton. OWA-honeypot [EB\/OL]. 2019.6 [2022.8.31]. https:\/\/github.com\/joda32\/owa-honeypot\/find\/master."},{"issue":"1","key":"e_1_3_2_1_38_1","first-page":"24","article-title":"An Application on Honeypot-Based Hybrid Deployment System: in the Turkish Software Industry [J]","volume":"1","author":"Karabulut B","year":"2020","unstructured":"Karabulut B, Aydin M A, Zaim A H. An Application on Honeypot-Based Hybrid Deployment System: in the Turkish Software Industry [J]. BSEU Journal of Engineering Research and Technology, 2020, 1(1): 24-30.","journal-title":"BSEU Journal of Engineering Research and Technology"},{"key":"e_1_3_2_1_39_1","volume-title":"Implementation of a modern security systems honeypot honey network on wireless networks [C]\/\/2017 International Young Engineers Forum (YEF-ECE)","author":"Wafi H","year":"2017","unstructured":"Wafi H, Fiade A, Hakiem N, Implementation of a modern security systems honeypot honey network on wireless networks [C]\/\/2017 International Young Engineers Forum (YEF-ECE). IEEE, 2017: 91-96."},{"key":"e_1_3_2_1_40_1","volume-title":"Lightweight On-demand Honeypot Deployment for Cyber Deception [C]\/\/International Conference on Digital Forensics and Cyber Crime","author":"Acosta J C","year":"2022","unstructured":"Acosta J C, Basak A, Kiekintveld C, Lightweight On-demand Honeypot Deployment for Cyber Deception [C]\/\/International Conference on Digital Forensics and Cyber Crime. Springer, Cham, 2022: 294-312."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12265"}],"event":{"name":"ICECC 2023: 2023 The 6th International Conference on Electronics, Communications and Control Engineering","location":"Fukuoka Japan","acronym":"ICECC 2023"},"container-title":["Proceedings of the 2023 6th International Conference on Electronics, Communications and Control Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592307.3592325","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3592307.3592325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T09:33:20Z","timestamp":1755855200000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592307.3592325"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,24]]},"references-count":41,"alternative-id":["10.1145\/3592307.3592325","10.1145\/3592307"],"URL":"https:\/\/doi.org\/10.1145\/3592307.3592325","relation":{},"subject":[],"published":{"date-parts":[[2023,3,24]]},"assertion":[{"value":"2023-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}