{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:43Z","timestamp":1773615883502,"version":"3.50.1"},"reference-count":20,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700889","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:34:54Z","timestamp":1771936494000},"page":"1338-1344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detection of Honeypot Systems Based on a Comprehensive Analysis of Node Performance Indicators"],"prefix":"10.3103","volume":"59","author":[{"given":"T. D.","family":"Ovasapyan","sequence":"first","affiliation":[]},{"given":"D. A.","family":"Ponomarev","sequence":"additional","affiliation":[]},{"given":"D. V.","family":"Ivanov","sequence":"additional","affiliation":[]},{"given":"E. V.","family":"Zavadskii","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7923_CR1","unstructured":"Spherical insights. Advanced persistent threat protection market size, share, and COVID-19 impact analysis. https:\/\/www.sphericalinsights.com\/ru\/reports\/advanced-persistent-threat-protection-market. Cited April 10, 2025."},{"key":"7923_CR2","doi-asserted-by":"publisher","unstructured":"Mukkamala, S., Yendrapalli, K., Basnet, R., Shankarapani, M.K., and Sung, A.H., Detection of virtual environments and low interaction honeypots, 2007 IEEE SMC Information Assurance and Security Workshop, West Point, NY, 2007, IEEE, 2007, pp. 92\u201398. https:\/\/doi.org\/10.1109\/iaw.2007.381919","DOI":"10.1109\/iaw.2007.381919"},{"key":"7923_CR3","doi-asserted-by":"publisher","unstructured":"Fu, X., Yu, W., Cheng, D., Tan, X., Streff, K., and Graham, S., On recognizing virtual honeypots and countermeasures, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, IEEE, 2006, pp. 211\u2013218. https:\/\/doi.org\/10.1109\/dasc.2006.36","DOI":"10.1109\/dasc.2006.36"},{"key":"7923_CR4","doi-asserted-by":"publisher","unstructured":"Dornseif, M., Holz, T., and Klein, C.N., NoSEBrEaK\u2014Attacking honeynets, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, \n               2004, West Point, NY, 2004, IEEE, 2004, pp. 123\u2013129. https:\/\/doi.org\/10.1109\/iaw.2004.1437807","DOI":"10.1109\/iaw.2004.1437807"},{"key":"7923_CR5","doi-asserted-by":"publisher","unstructured":"Defibaugh-Chavez, P., Veeraghattam, R., Kannappa, M., et al., Network based detection of virtual environments and low interaction honeypots, 2006 IEEE Information Assurance Workshop, West Point, NY, 2006, IEEE, 2006, pp. 283\u2013289. https:\/\/doi.org\/10.1109\/IAW.2006.1652107","DOI":"10.1109\/IAW.2006.1652107"},{"key":"7923_CR6","doi-asserted-by":"publisher","unstructured":"Zamiri-Gourabi, M.R., Qalaei, A.R., and Azad, B.A., Gas what? I can see your GasPots. Studying the fingerprintability of ICS honeypots in the wild, Proceedings of the Fifth Annual Industrial Control System Security (ICSS) Workshop, San Juan, PR, 2019, New York: Association for Computing Machinery, 2019, pp. 30\u201337. https:\/\/doi.org\/10.1145\/3372318.3372322","DOI":"10.1145\/3372318.3372322"},{"key":"7923_CR7","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/msecp.2004.1264861","volume":"2","author":"N. Krawetz","year":"2004","unstructured":"Krawetz, N., Anti-honeypot technology, IEEE Security amp; \n               Privacy Magazine, 2004, vol. 2, no. 1, pp. 76\u201379. https:\/\/doi.org\/10.1109\/msecp.2004.1264861","journal-title":"Privacy Magazine"},{"key":"7923_CR8","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.3103\/s0146411621080460","volume":"55","author":"E.V. Zavadskii","year":"2021","unstructured":"Zavadskii, E.V. and Ivanov, D.V., Implementation of honeypot systems based on the potential attack graph, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1194\u20131200. https:\/\/doi.org\/10.3103\/s0146411621080460","journal-title":"Autom. Control Comput. Sci."},{"key":"7923_CR9","doi-asserted-by":"publisher","unstructured":"Uitto, J., Rauti, S., Laur\u00e9n, S., and Lepp\u00e4nen, V., A survey on anti-honeypot and anti-introspection methods, Recent Advances in Information Systems and Technologies. WorldCIST 2017, Rocha, \u00c1., Correia, A., Adeli, H., Reis, L., and Costanzo, S., Eds., Advances in Intelligent Systems and Computing, vol. 570, Cham: Springer, 2017, pp. 125\u2013134. https:\/\/doi.org\/10.1007\/978-3-319-56538-5_13","DOI":"10.1007\/978-3-319-56538-5_13"},{"key":"7923_CR10","doi-asserted-by":"publisher","first-page":"103792","DOI":"10.1016\/j.cose.2024.103792","volume":"140","author":"A. Javadpour","year":"2024","unstructured":"Javadpour, A., Ja\u2019fari, F., Taleb, T., Shojafar, M., and Benza\u00efd, Ch., A comprehensive survey on cyber deception techniques to improve honeypot performance, Comput. Secur., 2024, vol. 140, p. 103792. https:\/\/doi.org\/10.1016\/j.cose.2024.103792","journal-title":"Comput. Secur."},{"key":"7923_CR11","doi-asserted-by":"publisher","unstructured":"Lackner, P., How to mock a bear: Honeypot, honeynet, honeywall & honeytoken: A survey, Proceedings of the 23rd International Conference on Enterprise Information Systems, SCITEPRESS\u2013Science and Technology Publications, 2021, vol. 2, pp. 181\u2013188. https:\/\/doi.org\/10.5220\/0010400001810188","DOI":"10.5220\/0010400001810188"},{"key":"7923_CR12","doi-asserted-by":"publisher","first-page":"916","DOI":"10.3103\/s014641162208003x","volume":"56","author":"V.D. Danilov","year":"2022","unstructured":"Danilov, V.D., Ovasapyan, T.D., Ivanov, D.V., Konoplev, A.S., and Moskvin, D.A., Generation of synthetic data for honeypot systems using deep learning methods, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 916\u2013926. https:\/\/doi.org\/10.3103\/s014641162208003x","journal-title":"Autom. Control Comput. Sci."},{"key":"7923_CR13","doi-asserted-by":"publisher","first-page":"2351","DOI":"10.1109\/comst.2021.3106669","volume":"23","author":"J. Franco","year":"2021","unstructured":"Franco, J., Aris, A., Canberk, B., and Uluagac, A.S., A survey of honeypots and honeynets for Internet of Things, Industrial Internet of Things, and cyber-physical systems, IEEE Commun. Surv. Tutorials, 2021, vol. 23, no. 4, pp. 2351\u20132383. https:\/\/doi.org\/10.1109\/comst.2021.3106669","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"7923_CR14","unstructured":"Naeem, A.A.N., Honeypots: Concepts, approaches and challenges, 2021."},{"key":"7923_CR15","doi-asserted-by":"publisher","unstructured":"Nyamugudza, T., Rajasekar, V., Sen, P., Nirmala, M., and Madhu Viswanatham, V., Network traffic intelligence using a low interaction honeypot, IOP Conf. Ser.: Mater. Sci. Eng., 2017, vol. 263, no. 4, p. 042096. https:\/\/doi.org\/10.1088\/1757-899x\/263\/4\/042096","DOI":"10.1088\/1757-899x\/263\/4\/042096"},{"key":"7923_CR16","first-page":"62","volume":"7","author":"R. Karthikeyan","year":"2017","unstructured":"Karthikeyan, R., Geetha, D.T., Vijayalakshmi, S., and Sumitha, R., Honeypots for network security, International Journal for Research & Development in Technology, 2017, vol. 7, no. 2, pp. 62\u201366.","journal-title":"International Journal for Research & Development in Technology"},{"key":"7923_CR17","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.3103\/s0146411621080253","volume":"55","author":"T.D. Ovasapyan","year":"2021","unstructured":"Ovasapyan, T.D., Nikulkin, V.A., and Moskvin, D.A., Applying honeypot technology with adaptive behavior to Internet-of-Things networks, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1104\u20131110. https:\/\/doi.org\/10.3103\/s0146411621080253","journal-title":"Autom. Control Comput. Sci."},{"key":"7923_CR18","unstructured":"OneClassSVM. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.svm.OneClassSVM.html. Cited April 8, 2025."},{"key":"7923_CR19","unstructured":"IsolationForest. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.ensemble.IsolationForest.html. Cited April 8, 2025."},{"key":"7923_CR20","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.3103\/s0146411621080307","volume":"55","author":"M.D. Stepanov","year":"2021","unstructured":"Stepanov, M.D., Pavlenko, E.Yu., and Lavrova, D.S., Detecting network attacks on software configured networks using the isolating forest algorithm, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1039\u20131050. https:\/\/doi.org\/10.3103\/s0146411621080307","journal-title":"Autom. Control Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700889.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700889","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700889.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:06:17Z","timestamp":1773612377000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":20,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7923"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700889","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"21 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}