A comprehensive survey on cyber deception techniques to improve honeypot performance

Honeypot technologies are becoming increasingly popular in cybersecurity as they offer valuable insights into adversary behavior with a low rate of false detections. By diverting the attention of potential attackers and siphoning off their resources, honeypots are a powerful tool for protecting crit...

Full description

Saved in:
Bibliographic Details
Published inComputers & security Vol. 140; p. 103792
Main Authors Javadpour, Amir, Ja'fari, Forough, Taleb, Tarik, Shojafar, Mohammad, Benzaïd, Chafika
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.05.2024
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Honeypot technologies are becoming increasingly popular in cybersecurity as they offer valuable insights into adversary behavior with a low rate of false detections. By diverting the attention of potential attackers and siphoning off their resources, honeypots are a powerful tool for protecting critical assets within a network. However, the cybersecurity landscape constantly evolves, and professional attackers are always working to uncover and bypass honeypots. Once an adversary successfully identifies a deception mechanism in place, they may change their tactics, potentially causing significant harm to the network. Maintaining a high level of deception is crucial for honeypots to remain undetectable. This paper explores various deception techniques designed specifically for honeypots to enhance their performance while making them impervious to detection. Previous research has not provided a detailed comparison of these techniques, particularly those tailored to honeynets. Therefore, we categorize the presented techniques into relevant classes, subject them to a comparative analysis, and evaluate their effectiveness in simulation scenarios. We also present a mathematical model that comprehensively represents and compares various honeynet research endeavors. In addition, we provide insightful suggestions that highlight the existing research gaps in this field and offer a roadmap for future expansion. This includes extending deception techniques to emulate vulnerabilities inherent in 5G and software-defined networks, which address the evolving challenges of the cybersecurity landscape. The findings and insights presented in this paper are valuable to honeypot developers and cybersecurity researchers alike, providing a vital resource for advancing the field and fortifying network defenses against ever-evolving threats.
AbstractList Honeypot technologies are becoming increasingly popular in cybersecurity as they offer valuable insights into adversary behavior with a low rate of false detections. By diverting the attention of potential attackers and siphoning off their resources, honeypots are a powerful tool for protecting critical assets within a network. However, the cybersecurity landscape constantly evolves, and professional attackers are always working to uncover and bypass honeypots. Once an adversary successfully identifies a deception mechanism in place, they may change their tactics, potentially causing significant harm to the network. Maintaining a high level of deception is crucial for honeypots to remain undetectable. This paper explores various deception techniques designed specifically for honeypots to enhance their performance while making them impervious to detection. Previous research has not provided a detailed comparison of these techniques, particularly those tailored to honeynets. Therefore, we categorize the presented techniques into relevant classes, subject them to a comparative analysis, and evaluate their effectiveness in simulation scenarios. We also present a mathematical model that comprehensively represents and compares various honeynet research endeavors. In addition, we provide insightful suggestions that highlight the existing research gaps in this field and offer a roadmap for future expansion. This includes extending deception techniques to emulate vulnerabilities inherent in 5G and software-defined networks, which address the evolving challenges of the cybersecurity landscape. The findings and insights presented in this paper are valuable to honeypot developers and cybersecurity researchers alike, providing a vital resource for advancing the field and fortifying network defenses against ever-evolving threats.
ArticleNumber 103792
Author Ja'fari, Forough
Javadpour, Amir
Shojafar, Mohammad
Taleb, Tarik
Benzaïd, Chafika
Author_xml – sequence: 1
  givenname: Amir
  surname: Javadpour
  fullname: Javadpour, Amir
  email: a.javadpour87@gmail.com
  organization: ICTFICIAL Oy, Espoo, Finland
– sequence: 2
  givenname: Forough
  surname: Ja'fari
  fullname: Ja'fari, Forough
  email: azadeh.mth@gmail.com
  organization: Department of Computer Engineering, Yazd University, Safaeih, Yazd, 100190, Iran
– sequence: 3
  givenname: Tarik
  surname: Taleb
  fullname: Taleb, Tarik
  email: tarik.taleb@rub.de
  organization: Faculty of Electrical Engineering and Information Technology, Ruhr University Bochum, Bochum, Germany
– sequence: 4
  givenname: Mohammad
  surname: Shojafar
  fullname: Shojafar, Mohammad
  email: m.shojafar@surrey.ac.uk
  organization: 5G/6GIC, Institute for Communication Systems (ICS), University of Surrey, Guildford, GU27XH, United Kingdom
– sequence: 5
  givenname: Chafika
  surname: Benzaïd
  fullname: Benzaïd, Chafika
  email: chafika.benzaid@oulu.fi
  organization: Faculty of Information Technology and Electrical Engineering, University of Oulu, Finland
BookMark eNp9kEFrAjEQhUOxULX9Az3lD6xNstndCL2ItLUg9GLPIclOMKKbbRKF_ffNYk89eBpmeN_w3puhSec7QOiZkgUltH45LIyPsGCE8XwomyW7Q1MqGlbUjIgJmmZRU3DCxQOaxXgghDa1EFO0W2HjT32APXTRXQDHc7jAgH2HzaAh4BYM9MnlPYHZd-7nDBEnj12GfNbvs5Gh9wn3EKwPJ9UZeET3Vh0jPP3NOfp-f9utN8X26-NzvdoWpuQ8FVbzipqK10qQypZly4lRUNfEasW0VpUWutGa86ayZNlWxFIOLWGGqBKA8XKOxPWvCT7GAFYal9RoNgXljpISObYjD3JsR47tyGs7GWX_0D64kwrDbej1CkEOdXEQZDQOcuDWBTBJtt7dwn8BPTeC1w
CitedBy_id crossref_primary_10_3390_s25051382
crossref_primary_10_1016_j_cose_2024_104032
crossref_primary_10_1111_coin_70020
crossref_primary_10_1007_s44196_025_00741_7
crossref_primary_10_1109_JIOT_2024_3450192
crossref_primary_10_1016_j_cose_2024_103981
crossref_primary_10_1038_s41598_025_93138_7
crossref_primary_10_34248_bsengineering_1531420
crossref_primary_10_4236_jis_2024_153019
crossref_primary_10_1109_ACCESS_2024_3525064
crossref_primary_10_1109_ACCESS_2024_3443142
crossref_primary_10_1007_s10207_025_01011_5
crossref_primary_10_1016_j_jnca_2024_103918
crossref_primary_10_1016_j_knosys_2024_112732
crossref_primary_10_1007_s00607_024_01360_4
crossref_primary_10_1007_s11334_024_00594_x
Cites_doi 10.1016/j.future.2020.08.021
10.1109/TSG.2017.2670144
10.1016/j.comnet.2023.109776
10.1016/j.rineng.2022.100576
10.1016/j.cose.2023.103268
10.1145/3337772
10.1080/01402398208437106
10.1109/MNET.011.2000088
10.3390/s22208046
10.1109/TDSC.2015.2406707
10.1016/j.cose.2021.102598
10.1016/j.future.2022.11.008
10.1007/s10586-022-03621-3
10.4304/jcp.2.2.25-36
10.3390/electronics9030415
10.1155/2023/8981988
10.1007/s12652-020-02461-6
10.1145/3582077
10.1109/JSAC.2019.2894307
10.1016/j.cosrev.2023.100600
10.1007/s13278-014-0221-5
10.1016/j.cose.2020.101761
10.1016/j.cose.2020.101870
10.3390/sym13040597
10.1016/j.eswa.2022.117073
10.1016/j.destud.2009.07.002
10.1016/j.ins.2023.119530
10.1145/2854152
10.30630/joiv.6.1.853
10.1016/j.cose.2021.102288
10.3390/s22062194
10.1007/s11227-021-03871-9
10.1109/ACCESS.2022.3210117
10.1145/3545574
10.1002/sec.242
10.1016/j.comcom.2009.03.005
10.1109/TNSM.2022.3179965
10.20533/jitst.2046.3723.2015.0047
10.1007/s11277-019-06176-6
10.1109/TNSM.2023.3254581
10.1038/s41598-023-28613-0
10.1007/s11227-019-03005-2
10.1016/j.cose.2022.102892
10.1109/COMST.2021.3102874
10.1109/TIFS.2022.3220939
10.1109/MC.2017.201
10.1109/JSYST.2017.2762161
10.1007/s10207-017-0361-5
10.1007/s10586-022-03629-9
10.1109/TDSC.2007.1002
10.1007/s11277-019-06773-5
10.3390/fi15040127
10.1109/TIFS.2018.2886472
10.1109/MNET.104.2100495
10.1109/TNSM.2017.2724239
10.36548/jscp.2023.3.002
10.1016/j.compeleceng.2022.108212
10.3390/jcp2010010
10.1145/3214305
10.1109/TETCI.2020.3023447
10.3390/math11010249
10.1109/JIOT.2016.2547994
10.1073/pnas.1412810111
10.1049/iet-ifs.2015.0256
10.1016/j.procs.2015.05.370
10.3390/s23084060
10.1016/j.jss.2018.03.031
ContentType Journal Article
Copyright 2024 The Author(s)
Copyright_xml – notice: 2024 The Author(s)
DBID 6I.
AAFTH
AAYXX
CITATION
DOI 10.1016/j.cose.2024.103792
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-6208
ExternalDocumentID 10_1016_j_cose_2024_103792
S0167404824000932
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
6I.
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAFTH
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFSI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADHUB
ADJOM
ADMUD
AEBSH
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
AKRWK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLX
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG8
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
RNS
ROL
RPZ
RXW
SBC
SBM
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
TAE
TN5
TWZ
WH7
WUQ
XJE
XPP
XSW
YK3
ZMT
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
ID FETCH-LOGICAL-c344t-fb451c546a805f33d40cae660fba2bba5b8b7bb4475f09d50f14ed02c0a3ee243
IEDL.DBID .~1
ISSN 0167-4048
IngestDate Tue Jul 01 03:48:25 EDT 2025
Thu Apr 24 23:03:43 EDT 2025
Sat Apr 13 16:39:56 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Cyber deception
Cybersecurity
Honeypot performance
Professional adversaries
Honeynet efficiency
Language English
License This is an open access article under the CC BY license.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c344t-fb451c546a805f33d40cae660fba2bba5b8b7bb4475f09d50f14ed02c0a3ee243
OpenAccessLink https://www.sciencedirect.com/science/article/pii/S0167404824000932
ParticipantIDs crossref_citationtrail_10_1016_j_cose_2024_103792
crossref_primary_10_1016_j_cose_2024_103792
elsevier_sciencedirect_doi_10_1016_j_cose_2024_103792
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate May 2024
2024-05-00
PublicationDateYYYYMMDD 2024-05-01
PublicationDate_xml – month: 05
  year: 2024
  text: May 2024
PublicationDecade 2020
PublicationTitle Computers & security
PublicationYear 2024
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Bringer, Chelmecki, Fujinoki (br0930) 2012; 4
Erguler (br0790) March 2016; 13
Koziol (br0190) 2003
Wang (br0020) 2022
Chen, Buford (br0560) 2009
Kiekintveld, Lisỳ, Píbil (br1320) 2015
Fan, Fernández, Du (br0400) 2017; 11
Pashaei, Akbari, Lighvan, Charmin (br1890) 2022; 16
Abdulqadder, Zou, Aziz (br1840) 2023; 141
Durkota, Lisỳ, Bošanskỳ, Kiekintveld (br1330) 2015
Pawlick, Zhu (br1420) 2015
Ren, Zhang (br1470) 2020; 97
Hayatle, Otrok, Youssef (br0610) June 2012
Drew, Heinen (br1650) 2022
Shakarian, Paulo, Albanese, Jajodia (br0710) 2014
Abay, Akcora, Zhou, Kantarcioglu, Thuraisingham (br0630) 2019
La, Quek, Lee, Jin, Zhu (br0840) 2016; 3
Jonsson, Marteni (br1020) 2022
Cantella (br1580) 2021
Suratkar, Shah, Sood, Loya, Bisure, Patil, Kazi (br0740) 2021
Jones (br2050) 2022
Sethuraman, Jadapalli, Sudhakaran, Mohanty (br1660) 2023; 50
Bowen, Hershkop, Keromytis, Stolfo (br1050) 2009
Zhu, Anwar, Wan, Cho, Kamhoua, Singh (br1240) 2021; 23
Benzaïd, Taleb (br2040) 2020; 34
Soundararajan, Rajagopal, Muthuramalingam, Hossain, Lloret (br1900) 2022; 22
Zobal, Kolář, Fujdiak (br0240) 2019
De Faveri, Moreira, Amaral (br1550) 2018; 141
Pawlick, Colbert, Zhu (br1610) 2019; 52
Limouchi, Mahgoub (br1450) 2021
Wegerer, Tjoa (br0800) Aug 2016
Rich (br2080) 2023
Pawlick, Zhu (br1250) 2021
Srinivasa, Pedersen, Vasilomanolakis (br1130) 2022
Akingbola, Dahunsi, Alese, Adewale, Ogundele (br0670) 06 2015; 4
Javadpour, Ja'fari, Taleb, Benzaıd (br0120) 2023
Valero, Pérez, Celdrán, Pérez (br0050) 2020
Biedermann, Mink, Katzenbeisser (br0860) 2012
Agarwal (br2070) 2022
Tan, Eng, How, Zhu, Jyh (br1870) 2023
Yang, Yuan, Yang, Kong, Zhang, Zhao (br1800) 2023; 15
Shin, Lowry (br1150) 2020; 92
Khan, Abbasi (br0480) 2020; 9
Raharjo, Nurmala, Pambudi, Sari (br1750) 2022
Javadpour, Ja'fari, Taleb, Shojafar, Yang (br0030) 2022; 18
Kheir, Abdelrazek, Daniel (br2010) 2022
Priya, Chakkaravarthy (br1640) 2023; 13
Papaspirou, Maglaras, Ferrag, Kantzavelou, Janicke, Douligeris (br1010) 2021
Hedayati, Mostafavi (br0100) 2021
Fan, Du, Fernández, Villagra (br0160) 2017; 12
Kumar, Sehgal, Bhatia (br0310) 2012
Dantu, Cangussu, Patwardhan (br0680) 2007; 4
Salimova (br1830) 2022; 2
Voris, Jermyn, Keromytis, Stolfo (br1070) 2013
Fan, Fernández (br0900) 2017
Ackerman (br1180) 2020
Anwar, Kamhoua, Leslie, Kiekintveld (br1980) 2022; 19
Javadpour, Ja'fari, Taleb, Benzaïd (br1990) 2023
Ikuomenisan, Morgan (br1780) 2022; 13
Izagirre (br1030) 2017
Wang, Santillan, Kuipers (br0420) 2018
Riggs, Tufail, Parvez, Tariq, Khan, Amir, Vuda, Sarwat (br2090) 2023; 23
Perevozchikov, Shaymardanov, Chugunkov (br0370) 2017
Han, Kheir, Balzarotti (br1630) 2018; 51
Seungjin, Abdullah, Jhanjhi (br0250) 2020; 11
Javadpour, Abharian, Wang (br0090) 2017
Rahmatullah, Nasution, Azmi (br0350) 2016
Argyratos (br1500) 2021
Han, Zhao, Doupé, Ahn (br0170) 2016
Alosefer, Rana (br0300) 2010
Panda, Rass, Moschoyiannis, Liang, Loukas, Panaousis (br1760) 2022; 10
Rossotti (br2110) 2022
Badr, Hariri, Youssif, Blasch (br1210) 2015; 51
Shi, Jiang, Liu, Han (br1200) 2012
Ganesarathinam, Prabakar, Singaravelu, Fernandez (br0180) 2020
Carroll, Grosu (br1390) 2011; 4
Shabtai, Bercovitch, Rokach, Gal, Elovici, Shmueli (br0940) 2016; 18
Nazario (br0280) 2009; 9
Hirata, Miyamoto, Nakayama, Esaki (br0340) Nov 2015
Fraunholz, Krohmer, Anton, Schotten (br0380) 2017
Om Kumar, Sathia Bhama (br0980) 2019; 75
Toor, Bhandari (br0110) 2017
Javadpour, Pinto, Ja'fari, Zhang (br0060) 2023; 26
Zhuge, Holz, Han, Guo, Zou (br0270) 2007
White, Park, Kamhoua, Kwiat (br1000) 2014; 4
Park, Dang, Noh, Yi, Park (br0450) 2019
Bedi, Roy, Shiva (br1120) 2011
Fan, Du, Smith-Creasey, Fernandez (br0440) 2019; 37
Pauna, Iacob, Bica (br0730) 2018
Eriksson (br1740) 2023
Gjermundrød, Dionysiou (br0700) 2015
Almeshekah, Spafford, Atallah (br1160) 2013
Domingue, Lakhtakia, Pulsifer, Hall, Badding, Bischof, Martín-Palma, Imrei, Janik, Mastro (br1080) 2014; 111
Çeker, Zhuang, Upadhyaya, La, Soong (br1400) 2016
Fraunholz, Anton, Lipps, Reti, Krohmer, Pohl, Tammen, Schotten (br0220) 2018
Cranford, Ou, Gonzalez, Tambe, Lebiere (br1720) 2023
Qin, Jiang, Cen, Doss (br0990) 2023
Park, Stolfo (br0820) 2012
Chakraborty, Jajodia, Katz, Picariello, Sperli, Subrahmanian (br0640) 2019
Adjou, Benzaïd, Taleb (br1950) 2022
Huang, Fan, Huang, Cheng, Xiao (br0590) 2020; vol. 1
Kreps (br1490) 1989
Almeshekah, Spafford (br1560) 2014
Ferretti, Pogliani, Zanero (br0430) 2019
Hobert, Lim, Budiarto (br1770) 2023
Anwar, Kamhoua, Leslie (br1360) 2019
Kolias, Kambourakis, Stavrou, Voas (br0010) 2017; 50
Jones (br1090) 2016; 40
Pa, Suzuki, Yoshioka, Matsumoto, Kasama, Rossow (br0360) 2016; 24
De Faveri, Moreira (br1540) 2016
Jiang, Hao, Wang (br0290) 2010; vol. 1
Luo, Xu, Jin, Jia, Ouyang (br0410) 2017
Shumakov, Troitskiy, Silnov (br0580) June 2017
Sarr, Anwar, Kamhoua, Leslie, Acosta (br1350) 2020
Ibrahim, Tariq, Ahamed Ahanger, Tariq, Gebali (br2100) 2023; 11
Javadpour, Ja'fari, Taleb, Shojafar (br0040) 2022
Durkota, Lisỳ, Bošanskỳ, Kiekintveld (br1340) 2015
Sun, Sun, Li (br1060) 2020
Suryawanshi, Tayade, Patil, Patil, Rajput (br0780) 2017; vol. 2
Conti, Trolese, Turrin (br1910) 2022
Cai, Yegneswaran, Alfeld, Barford (br1380) 2009
Fraunholz, Schotten (br0660) 2018
Javadpour (br2030) 2019; 106
Naeem, Batchelder, Hendren (br0540) 2007
Tabari, Liu, Ou, Singhal (br1860) 2023
Feng, Lubis (br2120) 2022
Achleitner, La Porta, McDaniel, Sugrim, Krishnamurthy, Chadha (br0720) 2017; 14
Razali, Razali, Mansor, Muruti, Jamil (br0230) 2018
Maesschalck, Giotsas, Green, Race (br1670) 2022; 114
Naik, Shang, Jenkins, Shen (br0460) 2020
Faveri (br1230) 2022
Nelson, Wilson, Rosen, Yen (br0530) 2009; 30
Whaley (br1600) 1982; 5
Jha (br1930) 2023; 5
Ferguson-Walter, Major, Johnson, Johnson, Scott, Gutzwiller, Shade (br1710) 2023; 130
Sahin, Hébert, Cabrera Lozoya (br1040) 2022
Althonayan, Andronache (br1260) 2019
You, Lv, Zhao, Niu, Shi, Sun (br0470) 2020
Alyas, Alissa, Alqahtani, Faiz, Alsaif, Tabassum, Naqvi (br1880) 2022; 2022
Gonzalez, Aggarwal, Cranford, Lebiere (br1700) 2022
Srinivasa, Pedersen, Vasilomanolakis (br0970) 2020
Ja'fari, Mostafavi, Mizanian, Jafari (br0490) 2021; 12
Pawlick, Colbert, Zhu (br1430) 2018; 14
Sangaiah, Javadpour, Ja'fari, Pinto, Zhang, Balasubramanian (br0070) 2023; 26
Dahbul, Lim, Purnama (br0550) 2017; vol. 801
McCarthy, Ghadafi, Andriotis, Legg (br0500) 2022; 2
Rowe (br0620) Jan 2006; vol. 6
Sumadi, Widagdo, Reza (br1810) 2022; 6
Steingartner, Galinec, Kozina (br1220) 2021; 13
Javadpour (br1970) 2020; 110
Khoa, Do Hoang, Ngo-Khanh, Duy, Pham (br1960) 2023
Píbil, Lisỳ, Kiekintveld, Bošanskỳ, Pěchouček (br1310) 2012
Doubleday, Maglaras, Janicke (br0140) 2016
Garg, Grosu (br1410) June 2007
Popli, Girdhar (br0520) 2019
Guerra Manzanares (br0390) 2017
Fan, Du, Fernández (br0150) 2015
Mokube, Adams (br0960) 2007
Crouse (br1280) 2012
Siniosoglou, Efstathopoulos, Pliatsios, Moscholios, Sarigiannidis, Sakellari, Loukas, Sarigiannidis (br0570) 2020
de Nobrega (br1140) 2023
Wang, Wu (br0890) 2019
Javadpour, Wang (br1940) 2022; 78
Zhang, Thing (br1170) 2021; 106
Fraunholz, Schotten (br1300) 2018
Gautam, Kumar, Bhattacharya (br0200) Dec 2015
Anwar, Kamhoua, Leslie (br1370) 2020
Han, Molinaro, Picariello, Sperli, Subrahmanian, Xiong (br0650) 2021
Wang, Du, Maharjan, Sun (br0510) 2017; 8
Benzaïd, Taleb, Song (br2000) 2022; 36
Crochelet, Neal, Cuppens, Cuppens (br1790) 2022
Almeshekah, Spafford (br0130) 2016
Santhosh Kumar, Selvi, Kannan (br1730) 2023; 2023
Rowe, Custy, Duong (br0910) 2007; 2
Sardana, Joshi (br0870) 2009; 32
Kandanaarachchi, Ochiai, Rao (br1680) 2022; 201
Crouse, Prosser, Fulp (br1290) 2015
Zarras (br0330) Oct 2014
Sun, Yuan, Lee, Bishop, Porter, Li, Gregio, Oliveira (br0690) 2017
Ayeni, Alese, Omotosho (br0320) 2013; 975
Graham, Olson, Howard (br1510) 2016
Mohan, Dixit, Gyaneshwar, Chadha, Srinivasan, Seo (br1100) 2022; 22
Tian, Bates, Butler (br0880) 2015
Huang, Zhu (br1460) 2019
Heckman, Stech, Thomas, Schmoker, Tsow (br1520) 2015; 64
McCoy (br2060) 2022
Dalamagkas, Sarigiannidis, Ioannidis, Iturbe, Nikolis, Ramos, Rios, Sarigiannidis, Tzovaras (br0920) 2019
Yamin, Katt (br1850) 2022; 122
Juels, Rivest (br0760) 2013; vol. 11
Lackner (br0260) 2021
Marble, Lawless, Mittu, Coyne, Abramson, Sibley (br1190) 2015
Bilinski, Gabrys, Mauger (br1440) 2018
Akiyama, Yagi, Hariu, Kadobayashi (br0830) 2018; 17
Sangaiah, Javadpour, Pinto (br0080) 2023
Msaad, Srinivasa, Andersen, Audran, Orji, Vasilomanolakis (br0950) 2022
Apruzzese, Laskov, Montes de Oca, Mallouli, Brdalo Rapa, Grammatopoulos, Di Franco (br1920) 2023; 4
Bercovitch, Renford, Hasson, Shabtai, Rokach, Elovici (br0770) 2011
Selvaraj, Kuthadi, Marwala (br0850) 2016
Wang, He, Zhang, Liu, Liu, Javadpour (br1530) 2022; 102
Dowling, Schukat, Barrett (br0750) 2018
Ferguson-Walter, Major, Johnson, Muhleman (br0210) 2021
Ren, Zhang, Hao (br1480) 2021; 116
Wagener, Dulaunoy, Engel (br0600) 2009
Chung, Yang, Wang, Cento, Jerath, Raman, Lie, Chignell (br1690) 2023
Bilinski (10.1016/j.cose.2024.103792_br1440) 2018
Huang (10.1016/j.cose.2024.103792_br1460) 2019
Suratkar (10.1016/j.cose.2024.103792_br0740) 2021
Sangaiah (10.1016/j.cose.2024.103792_br0070) 2023; 26
Fraunholz (10.1016/j.cose.2024.103792_br0660) 2018
Raharjo (10.1016/j.cose.2024.103792_br1750) 2022
Althonayan (10.1016/j.cose.2024.103792_br1260) 2019
Huang (10.1016/j.cose.2024.103792_br0590) 2020; vol. 1
Ackerman (10.1016/j.cose.2024.103792_br1180) 2020
Rich (10.1016/j.cose.2024.103792_br2080) 2023
Tabari (10.1016/j.cose.2024.103792_br1860) 2023
Heckman (10.1016/j.cose.2024.103792_br1520) 2015; 64
Perevozchikov (10.1016/j.cose.2024.103792_br0370) 2017
Alosefer (10.1016/j.cose.2024.103792_br0300) 2010
Dowling (10.1016/j.cose.2024.103792_br0750) 2018
McCoy (10.1016/j.cose.2024.103792_br2060) 2022
Graham (10.1016/j.cose.2024.103792_br1510) 2016
Razali (10.1016/j.cose.2024.103792_br0230) 2018
Soundararajan (10.1016/j.cose.2024.103792_br1900) 2022; 22
Erguler (10.1016/j.cose.2024.103792_br0790) 2016; 13
Ferguson-Walter (10.1016/j.cose.2024.103792_br0210) 2021
Pawlick (10.1016/j.cose.2024.103792_br1610) 2019; 52
Shi (10.1016/j.cose.2024.103792_br1200) 2012
De Faveri (10.1016/j.cose.2024.103792_br1550) 2018; 141
Gonzalez (10.1016/j.cose.2024.103792_br1700) 2022
Shumakov (10.1016/j.cose.2024.103792_br0580) 2017
Khoa (10.1016/j.cose.2024.103792_br1960) 2023
Javadpour (10.1016/j.cose.2024.103792_br0090) 2017
Anwar (10.1016/j.cose.2024.103792_br1980) 2022; 19
Voris (10.1016/j.cose.2024.103792_br1070) 2013
Toor (10.1016/j.cose.2024.103792_br0110) 2017
Wang (10.1016/j.cose.2024.103792_br0510) 2017; 8
Crouse (10.1016/j.cose.2024.103792_br1290) 2015
Fan (10.1016/j.cose.2024.103792_br0400) 2017; 11
Pa (10.1016/j.cose.2024.103792_br0360) 2016; 24
Shakarian (10.1016/j.cose.2024.103792_br0710) 2014
Hobert (10.1016/j.cose.2024.103792_br1770) 2023
Whaley (10.1016/j.cose.2024.103792_br1600) 1982; 5
Fan (10.1016/j.cose.2024.103792_br0440) 2019; 37
Hedayati (10.1016/j.cose.2024.103792_br0100) 2021
Ayeni (10.1016/j.cose.2024.103792_br0320) 2013; 975
Javadpour (10.1016/j.cose.2024.103792_br0120) 2023
Gautam (10.1016/j.cose.2024.103792_br0200) 2015
Naeem (10.1016/j.cose.2024.103792_br0540) 2007
Dahbul (10.1016/j.cose.2024.103792_br0550) 2017; vol. 801
Naik (10.1016/j.cose.2024.103792_br0460) 2020
McCarthy (10.1016/j.cose.2024.103792_br0500) 2022; 2
Anwar (10.1016/j.cose.2024.103792_br1360) 2019
Papaspirou (10.1016/j.cose.2024.103792_br1010) 2021
Steingartner (10.1016/j.cose.2024.103792_br1220) 2021; 13
Zhuge (10.1016/j.cose.2024.103792_br0270) 2007
Durkota (10.1016/j.cose.2024.103792_br1340) 2015
Jones (10.1016/j.cose.2024.103792_br1090) 2016; 40
Apruzzese (10.1016/j.cose.2024.103792_br1920) 2023; 4
Píbil (10.1016/j.cose.2024.103792_br1310) 2012
Almeshekah (10.1016/j.cose.2024.103792_br1560) 2014
Adjou (10.1016/j.cose.2024.103792_br1950) 2022
Ganesarathinam (10.1016/j.cose.2024.103792_br0180) 2020
Park (10.1016/j.cose.2024.103792_br0820) 2012
Rossotti (10.1016/j.cose.2024.103792_br2110) 2022
Sethuraman (10.1016/j.cose.2024.103792_br1660) 2023; 50
Kolias (10.1016/j.cose.2024.103792_br0010) 2017; 50
Sarr (10.1016/j.cose.2024.103792_br1350) 2020
Benzaïd (10.1016/j.cose.2024.103792_br2000) 2022; 36
Abdulqadder (10.1016/j.cose.2024.103792_br1840) 2023; 141
Pawlick (10.1016/j.cose.2024.103792_br1250) 2021
Riggs (10.1016/j.cose.2024.103792_br2090) 2023; 23
Javadpour (10.1016/j.cose.2024.103792_br1990) 2023
Pauna (10.1016/j.cose.2024.103792_br0730) 2018
Han (10.1016/j.cose.2024.103792_br0170) 2016
Sangaiah (10.1016/j.cose.2024.103792_br0080) 2023
Tan (10.1016/j.cose.2024.103792_br1870) 2023
Bowen (10.1016/j.cose.2024.103792_br1050) 2009
Crouse (10.1016/j.cose.2024.103792_br1280) 2012
Cranford (10.1016/j.cose.2024.103792_br1720) 2023
Panda (10.1016/j.cose.2024.103792_br1760) 2022; 10
Chung (10.1016/j.cose.2024.103792_br1690) 2023
Doubleday (10.1016/j.cose.2024.103792_br0140) 2016
Ibrahim (10.1016/j.cose.2024.103792_br2100) 2023; 11
Santhosh Kumar (10.1016/j.cose.2024.103792_br1730) 2023; 2023
Sardana (10.1016/j.cose.2024.103792_br0870) 2009; 32
Fan (10.1016/j.cose.2024.103792_br0150) 2015
Fan (10.1016/j.cose.2024.103792_br0160) 2017; 12
Javadpour (10.1016/j.cose.2024.103792_br0060) 2023; 26
Wegerer (10.1016/j.cose.2024.103792_br0800) 2016
Zhang (10.1016/j.cose.2024.103792_br1170) 2021; 106
Rowe (10.1016/j.cose.2024.103792_br0620) 2006; vol. 6
de Nobrega (10.1016/j.cose.2024.103792_br1140) 2023
Pawlick (10.1016/j.cose.2024.103792_br1420)
Marble (10.1016/j.cose.2024.103792_br1190) 2015
Eriksson (10.1016/j.cose.2024.103792_br1740) 2023
Srinivasa (10.1016/j.cose.2024.103792_br1130) 2022
Almeshekah (10.1016/j.cose.2024.103792_br0130) 2016
Jonsson (10.1016/j.cose.2024.103792_br1020) 2022
Yamin (10.1016/j.cose.2024.103792_br1850) 2022; 122
Nazario (10.1016/j.cose.2024.103792_br0280) 2009; 9
Javadpour (10.1016/j.cose.2024.103792_br2030) 2019; 106
Sahin (10.1016/j.cose.2024.103792_br1040) 2022
Sumadi (10.1016/j.cose.2024.103792_br1810) 2022; 6
Abay (10.1016/j.cose.2024.103792_br0630) 2019
Popli (10.1016/j.cose.2024.103792_br0520) 2019
Seungjin (10.1016/j.cose.2024.103792_br0250) 2020; 11
Chakraborty (10.1016/j.cose.2024.103792_br0640) 2019
Conti (10.1016/j.cose.2024.103792_br1910) 2022
Cai (10.1016/j.cose.2024.103792_br1380) 2009
Kiekintveld (10.1016/j.cose.2024.103792_br1320) 2015
Suryawanshi (10.1016/j.cose.2024.103792_br0780) 2017; vol. 2
Javadpour (10.1016/j.cose.2024.103792_br0040) 2022
Salimova (10.1016/j.cose.2024.103792_br1830) 2022; 2
Mohan (10.1016/j.cose.2024.103792_br1100) 2022; 22
Jiang (10.1016/j.cose.2024.103792_br0290) 2010; vol. 1
Wagener (10.1016/j.cose.2024.103792_br0600) 2009
Jones (10.1016/j.cose.2024.103792_br2050) 2022
Biedermann (10.1016/j.cose.2024.103792_br0860) 2012
Carroll (10.1016/j.cose.2024.103792_br1390) 2011; 4
Zobal (10.1016/j.cose.2024.103792_br0240) 2019
Ren (10.1016/j.cose.2024.103792_br1480) 2021; 116
Akiyama (10.1016/j.cose.2024.103792_br0830) 2018; 17
Durkota (10.1016/j.cose.2024.103792_br1330) 2015
Rowe (10.1016/j.cose.2024.103792_br0910) 2007; 2
Faveri (10.1016/j.cose.2024.103792_br1230) 2022
Srinivasa (10.1016/j.cose.2024.103792_br0970) 2020
Pawlick (10.1016/j.cose.2024.103792_br1430) 2018; 14
Achleitner (10.1016/j.cose.2024.103792_br0720) 2017; 14
Qin (10.1016/j.cose.2024.103792_br0990) 2023
Tian (10.1016/j.cose.2024.103792_br0880) 2015
Feng (10.1016/j.cose.2024.103792_br2120) 2022
Bedi (10.1016/j.cose.2024.103792_br1120) 2011
Hayatle (10.1016/j.cose.2024.103792_br0610) 2012
Fan (10.1016/j.cose.2024.103792_br0900) 2017
Guerra Manzanares (10.1016/j.cose.2024.103792_br0390) 2017
Almeshekah (10.1016/j.cose.2024.103792_br1160) 2013
Bringer (10.1016/j.cose.2024.103792_br0930) 2012; 4
Fraunholz (10.1016/j.cose.2024.103792_br1300) 2018
Sun (10.1016/j.cose.2024.103792_br0690) 2017
Agarwal (10.1016/j.cose.2024.103792_br2070) 2022
Chen (10.1016/j.cose.2024.103792_br0560) 2009
Wang (10.1016/j.cose.2024.103792_br0420)
Javadpour (10.1016/j.cose.2024.103792_br1940) 2022; 78
Om Kumar (10.1016/j.cose.2024.103792_br0980) 2019; 75
Priya (10.1016/j.cose.2024.103792_br1640) 2023; 13
Akingbola (10.1016/j.cose.2024.103792_br0670) 2015; 4
Jha (10.1016/j.cose.2024.103792_br1930) 2023; 5
Alyas (10.1016/j.cose.2024.103792_br1880) 2022; 2022
Gjermundrød (10.1016/j.cose.2024.103792_br0700) 2015
Maesschalck (10.1016/j.cose.2024.103792_br1670) 2022; 114
Drew (10.1016/j.cose.2024.103792_br1650) 2022
Wang (10.1016/j.cose.2024.103792_br0020) 2022
Zhu (10.1016/j.cose.2024.103792_br1240) 2021; 23
Garg (10.1016/j.cose.2024.103792_br1410) 2007
Anwar (10.1016/j.cose.2024.103792_br1370) 2020
Luo (10.1016/j.cose.2024.103792_br0410) 2017
Javadpour (10.1016/j.cose.2024.103792_br1970) 2020; 110
Siniosoglou (10.1016/j.cose.2024.103792_br0570) 2020
Wang (10.1016/j.cose.2024.103792_br1530) 2022; 102
Rahmatullah (10.1016/j.cose.2024.103792_br0350) 2016
Park (10.1016/j.cose.2024.103792_br0450) 2019
Cantella (10.1016/j.cose.2024.103792_br1580) 2021
Shabtai (10.1016/j.cose.2024.103792_br0940) 2016; 18
Pashaei (10.1016/j.cose.2024.103792_br1890) 2022; 16
Domingue (10.1016/j.cose.2024.103792_br1080) 2014; 111
Ja'fari (10.1016/j.cose.2024.103792_br0490) 2021; 12
Hirata (10.1016/j.cose.2024.103792_br0340) 2015
Selvaraj (10.1016/j.cose.2024.103792_br0850) 2016
Kheir (10.1016/j.cose.2024.103792_br2010) 2022
Izagirre (10.1016/j.cose.2024.103792_br1030) 2017
Kandanaarachchi (10.1016/j.cose.2024.103792_br1680) 2022; 201
Nelson (10.1016/j.cose.2024.103792_br0530) 2009; 30
Yang (10.1016/j.cose.2024.103792_br1800) 2023; 15
Çeker (10.1016/j.cose.2024.103792_br1400) 2016
Argyratos (10.1016/j.cose.2024.103792_br1500) 2021
Fraunholz (10.1016/j.cose.2024.103792_br0220)
Valero (10.1016/j.cose.2024.103792_br0050) 2020
Han (10.1016/j.cose.2024.103792_br1630) 2018; 51
Badr (10.1016/j.cose.2024.103792_br1210) 2015; 51
You (10.1016/j.cose.2024.103792_br0470) 2020
Dalamagkas (10.1016/j.cose.2024.103792_br0920) 2019
Mokube (10.1016/j.cose.2024.103792_br0960) 2007
Dantu (10.1016/j.cose.2024.103792_br0680) 2007; 4
Crochelet (10.1016/j.cose.2024.103792_br1790) 2022
Shin (10.1016/j.cose.2024.103792_br1150) 2020; 92
Wang (10.1016/j.cose.2024.103792_br0890) 2019
Kumar (10.1016/j.cose.2024.103792_br0310) 2012
Juels (10.1016/j.cose.2024.103792_br0760) 2013; vol. 11
Ren (10.1016/j.cose.2024.103792_br1470) 2020; 97
Lackner (10.1016/j.cose.2024.103792_br0260) 2021
De Faveri (10.1016/j.cose.2024.103792_br1540) 2016
Koziol (10.1016/j.cose.2024.103792_br0190) 2003
Zarras (10.1016/j.cose.2024.103792_br0330) 2014
Bercovitch (10.1016/j.cose.2024.103792_br0770) 2011
Javadpour (10.1016/j.cose.2024.103792_br0030) 2022; 18
Msaad (10.1016/j.cose.2024.103792_br0950) 2022
Han (10.1016/j.cose.2024.103792_br0650) 2021
Ikuomenisan (10.1016/j.cose.2024.103792_br1780) 2022; 13
Limouchi (10.1016/j.cose.2024.103792_br1450) 2021
Khan (10.1016/j.cose.2024.103792_br0480) 2020; 9
Kreps (10.1016/j.cose.2024.103792_br1490) 1989
White (10.1016/j.cose.2024.103792_br1000) 2014; 4
Fraunholz (10.1016/j.cose.2024.103792_br0380) 2017
Ferguson-Walter (10.1016/j.cose.2024.103792_br1710) 2023; 130
La (10.1016/j.cose.2024.103792_br0840) 2016; 3
Sun (10.1016/j.cose.2024.103792_br1060) 2020
Benzaïd (10.1016/j.cose.2024.103792_br20
References_xml – start-page: 156
  year: 2018
  end-page: 161
  ident: br1300
  article-title: Strategic defense and attack in deception based network security
  publication-title: 2018 International Conference on Information Networking (ICOIN)
– start-page: 6662
  year: June 2012
  end-page: 6667
  ident: br0610
  article-title: A game theoretic investigation for high interaction honeypots
  publication-title: 2012 IEEE International Conference on Communications (ICC)
– volume: 12
  start-page: 2993
  year: 2021
  end-page: 3016
  ident: br0490
  article-title: An intelligent botnet blocking approach in software defined networks using honeypots
  publication-title: J. Ambient Intell. Humaniz. Comput.
– volume: 11
  start-page: 249
  year: 2023
  ident: br2100
  article-title: Retaliation against ransomware in cloud-enabled pureos system
  publication-title: Mathematics
– start-page: 341
  year: 2018
  end-page: 355
  ident: br0750
  article-title: Using reinforcement learning to conceal honeypot functionality
  publication-title: Joint European Conference on Machine Learning and Knowledge Discovery in Databases
– year: 2022
  ident: br0020
  article-title: The Observation of Smart Camera Security
– volume: 18
  start-page: 667
  year: 2022
  end-page: 682
  ident: br0030
  article-title: SCEMA: an SDN-oriented cost-effective edge-based MTD approach
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 130
  year: 2023
  ident: br1710
  article-title: Cyber expert feedback: experiences, expectations, and opinions about cyber deception
  publication-title: Comput. Secur.
– year: 2021
  ident: br1500
  article-title: Information theoretic analysis of deception and decisions in networks
– volume: 50
  year: 2023
  ident: br1660
  article-title: Flow based containerized honeypot approach for network traffic analysis: an empirical study
  publication-title: Comput. Sci. Rev.
– volume: 4
  start-page: 373
  year: 06 2015
  end-page: 379
  ident: br0670
  article-title: Improving deception capability in honeynet through data manipulation
  publication-title: J. Internet Technol. Secur. Trans.
– start-page: 1
  year: 2016
  end-page: 6
  ident: br0170
  article-title: Honeymix: toward sdn-based intelligent honeynet
  publication-title: Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization
– start-page: 1602
  year: 2019
  end-page: 1606
  ident: br0890
  article-title: Sdn-based hybrid honeypot for attack capture
  publication-title: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)
– year: 2020
  ident: br1180
  article-title: Modern Cybersecurity Practices: Exploring and Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization
– start-page: 16
  year: Nov 2015
  end-page: 24
  ident: br0340
  article-title: Intercept+: Sdn support for live migration-based honeypots
  publication-title: 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)
– year: 2015
  ident: br1330
  article-title: Optimal network security hardening using attack graph games
  publication-title: Twenty-Fourth International Joint Conference on Artificial Intelligence
– year: 2018
  ident: br0420
  article-title: Thingpot: an interactive Internet-of-things honeypot
– start-page: 195
  year: June 2017
  end-page: 198
  ident: br0580
  article-title: Increasing the attractiveness of false objects of attack on the web-servers
  publication-title: 2017 18th International Conference of Young Specialists on Micro/Nanotechnologies and Electron Devices (EDM)
– start-page: 375
  year: 2019
  end-page: 377
  ident: br0450
  article-title: Dynamic virtual network honeypot
  publication-title: 2019 International Conference on Information and Communication Technology Convergence (ICTC)
– volume: 114
  year: 2022
  ident: br1670
  article-title: Don't get stung, cover your ics in honey: how do honeypots fit within industrial control system security
  publication-title: Comput. Secur.
– volume: 23
  start-page: 2460
  year: 2021
  end-page: 2493
  ident: br1240
  article-title: A survey of defensive deception: approaches using game theory and machine learning
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 30
  start-page: 737
  year: 2009
  end-page: 743
  ident: br0530
  article-title: Refined metrics for measuring ideation effectiveness
  publication-title: Des. Stud.
– start-page: 101
  year: 2022
  end-page: 119
  ident: br0950
  article-title: Honeysweeper: towards stealthy honeytoken fingerprinting techniques
  publication-title: Nordic Conference on Secure IT Systems
– start-page: 1
  year: 2020
  end-page: 5
  ident: br0470
  article-title: A scalable high-interaction physical honeypot framework for programmable logic controller
  publication-title: 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall)
– start-page: 1
  year: 2020
  end-page: 7
  ident: br0570
  article-title: Neuralpot: an industrial honeypot implementation based on deep neural networks
  publication-title: 2020 IEEE Symposium on Computers and Communications (ISCC)
– start-page: 1
  year: 2017
  end-page: 7
  ident: br0380
  article-title: Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot
  publication-title: 2017 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
– year: 2023
  ident: br1140
  article-title: Cyber Defensive Capacity and Capability:: A Perspective from the Financial Sector of a Small State
– start-page: 1
  year: 2022
  end-page: 4
  ident: br1910
  article-title: Icspot: a high-interaction honeypot for industrial control systems
  publication-title: 2022 International Symposium on Networks, Computers and Communications (ISNCC)
– start-page: 75
  year: 2022
  end-page: 79
  ident: br1750
  article-title: Performance evaluation of intrusion detection system performance for traffic anomaly detection based on active ip reputation rules
  publication-title: 2022 3rd International Conference on Electrical Engineering and Informatics (ICon EEI)
– year: 2017
  ident: br0390
  article-title: Honeyio4: the construction of a virtual, low-interaction iot honeypot
– start-page: 01
  year: 2022
  end-page: 04
  ident: br2120
  article-title: Defense-in-depth security strategy in log4j vulnerability analysis
  publication-title: 2022 International Conference Advancement in Data Science, E-learning and Information Systems (ICADEIS)
– volume: 122
  year: 2022
  ident: br1850
  article-title: Use of cyber attack and defense agents in cyber ranges: a case study
  publication-title: Comput. Secur.
– start-page: 1
  year: 2020
  end-page: 9
  ident: br1060
  article-title: Towards a believable decoy system: replaying network activities from real system
  publication-title: 2020 IEEE Conference on Communications and Network Security (CNS)
– volume: 5
  start-page: 178
  year: 1982
  end-page: 192
  ident: br1600
  article-title: Toward a general theory of deception
  publication-title: J. Strateg. Stud.
– year: 2023
  ident: br1990
  article-title: Reinforcement learning-based slice isolation against ddos attacks in beyond 5g networks
  publication-title: IEEE Trans. Netw. Serv. Manag.
– year: 2023
  ident: br1740
  article-title: An Evaluation of Honeypots with Compliant Kubernetes
– start-page: 1
  year: 2017
  end-page: 11
  ident: br0410
  article-title: Iotcandyjar: towards an intelligent-interaction honeypot for iot devices
  publication-title: Black Hat
– volume: 13
  start-page: 210
  year: 2022
  end-page: 243
  ident: br1780
  article-title: Systematic review of graphical visual methods in honeypot attack data analysis
  publication-title: J. Inf. Secur.
– start-page: 115
  year: 2018
  end-page: 126
  ident: br1440
  article-title: Optimal placement of honeypots for network defense
  publication-title: International Conference on Decision and Game Theory for Security
– start-page: 81
  year: 2023
  end-page: 88
  ident: br0120
  article-title: A mathematical model for analyzing honeynets and their cyber deception techniques
  publication-title: 2023 27th International Conference on Engineering of Complex Computer Systems (ICECCS)
– start-page: 81
  year: 2015
  end-page: 101
  ident: br1320
  article-title: Game-theoretic foundations for the strategic use of honeypots in network security
  publication-title: Cyber Warfare
– volume: 6
  start-page: 39
  year: 2022
  end-page: 44
  ident: br1810
  article-title: Sd-honeypot integration for mitigating ddos attack using machine learning approaches
  publication-title: JOIV: Int. J. Inform. Vis.
– start-page: 3
  year: 2019
  end-page: 19
  ident: br0630
  article-title: Using deep learning to generate relational honeydata
  publication-title: Autonomous Cyber Deception
– year: 2017
  ident: br1030
  article-title: Deception Strategies for Web Application Security: Application-Layer Approaches and a Testing Platform
– volume: vol. 1
  start-page: 69
  year: 2010
  end-page: 72
  ident: br0290
  article-title: A malware sample capturing and tracking system
  publication-title: 2010 Second World Congress on Software Engineering
– volume: 141
  start-page: 339
  year: 2023
  end-page: 354
  ident: br1840
  article-title: The dag blockchain: a secure edge assisted honeypot for attack detection and multi-controller based load balancing in sdn 5g
  publication-title: Future Gener. Comput. Syst.
– year: 2022
  ident: br1650
  article-title: Testing deception with a commercial tool simulating cyberspace
– year: 2017
  ident: br0110
  article-title: Honeypot: a deceptive trap
  publication-title: Int. J. Eng. Technol. Manag. Appl. Sci.
– start-page: 1127
  year: 2021
  end-page: 1144
  ident: br0210
  article-title: Examining the efficacy of decoy-based and psychological cyber deception
  publication-title: 30th USENIX Security Symposium (USENIX Security 21)
– volume: 24
  start-page: 522
  year: 2016
  end-page: 533
  ident: br0360
  article-title: Iotpot: a novel honeypot for revealing current iot threats
  publication-title: J. Inf. Process.
– start-page: 21
  year: 2015
  end-page: 29
  ident: br1290
  article-title: Probabilistic performance analysis of moving target and deception reconnaissance defenses
  publication-title: Proceedings of the Second ACM Workshop on Moving Target Defense
– volume: 22
  start-page: 2194
  year: 2022
  ident: br1100
  article-title: Leveraging computational intelligence techniques for defensive deception: a review, recent advances, open problems and future directions
  publication-title: Sensors
– volume: 14
  start-page: 1871
  year: 2018
  end-page: 1886
  ident: br1430
  article-title: Modeling and analysis of leaky deception using signaling games with evidence
  publication-title: IEEE Trans. Inf. Forensics Secur.
– year: 2020
  ident: br0460
  article-title: D-fri-honeypot: a secure sting operation for hacking the hackers using dynamic fuzzy rule interpolation
  publication-title: IEEE Trans. Emerg. Top. Comput. Intell.
– volume: vol. 6
  year: Jan 2006
  ident: br0620
  article-title: Measuring the effectiveness of honeypot counter-counterdeception
  publication-title: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)
– start-page: 21
  year: 2018
  end-page: 25
  ident: br0660
  article-title: Defending web servers with feints, distraction and obfuscation
  publication-title: 2018 International Conference on Computing, Networking and Communications (ICNC)
– volume: 75
  start-page: 8312
  year: 2019
  end-page: 8338
  ident: br0980
  article-title: Detecting and confronting flash attacks from iot botnets
  publication-title: J. Supercomput.
– volume: 110
  start-page: 1057
  year: 2020
  end-page: 1071
  ident: br1970
  article-title: Providing a way to create balance between reliability and delays in sdn networks by using the appropriate placement of controllers
  publication-title: Wirel. Pers. Commun.
– volume: 22
  start-page: 8046
  year: 2022
  ident: br1900
  article-title: Interleaved honeypot-framing model with secure mac policies for wireless sensor networks
  publication-title: Sensors
– start-page: 1
  year: 2021
  end-page: 12
  ident: br0740
  article-title: An adaptive honeypot using q-learning with severity analyzer
  publication-title: J. Ambient Intell. Humaniz. Comput.
– start-page: 51
  year: 2009
  end-page: 70
  ident: br1050
  article-title: Baiting inside attackers using decoy documents
  publication-title: Security and Privacy in Communication Networks: 5th International ICST Conference
– volume: vol. 11
  start-page: 145
  year: 2013
  end-page: 160
  ident: br0760
  article-title: Honeywords: making password-cracking detectable
  publication-title: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
– volume: 975
  start-page: 8887
  year: 2013
  ident: br0320
  article-title: Design and implementation of a medium interaction honeypot
  publication-title: Int. J. Comput. Appl.
– year: 2016
  ident: br0140
  article-title: Ssh Honeypot: Building, Deploying and Analysis
– volume: 116
  start-page: 76
  year: 2021
  end-page: 85
  ident: br1480
  article-title: A theoretical method to evaluate honeynet potency
  publication-title: Future Gener. Comput. Syst.
– year: 2022
  ident: br2060
  article-title: A relevance model for threat-centric ranking of cybersecurity vulnerabilities
– volume: 13
  start-page: 284
  year: March 2016
  end-page: 295
  ident: br0790
  article-title: Achieving flatness: selecting the honeywords from existing user passwords
  publication-title: IEEE Trans. Dependable Secure Comput.
– start-page: 4173
  year: 2022
  end-page: 4178
  ident: br0040
  article-title: A cost-effective mtd approach for ddos attacks in software-defined networks
  publication-title: GLOBECOM 2022-2022 IEEE Global Communications Conference
– start-page: 1
  year: Oct 2014
  end-page: 6
  ident: br0330
  article-title: The art of false alarms in the game of deception: leveraging fake honeypots for enhanced security
  publication-title: 2014 International Carnahan Conference on Security Technology (ICCST)
– start-page: 73
  year: 2016
  end-page: 82
  ident: br0850
  article-title: Honey pot: a major technique for intrusion detection
  publication-title: Proceedings of the Second International Conference on Computer and Communication Technologies
– start-page: 13
  year: 2012
  end-page: 18
  ident: br0860
  article-title: Fast dynamic extracted honeypots in cloud computing
  publication-title: Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop
– start-page: 131
  year: 2011
  end-page: 136
  ident: br0770
  article-title: Honeygen: an automated honeytokens generator
  publication-title: Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics
– volume: 3
  start-page: 1025
  year: 2016
  end-page: 1035
  ident: br0840
  article-title: Deceptive attack and defense game in honeypot-enabled networks for the Internet of things
  publication-title: IEEE Int. Things J.
– start-page: 6
  year: Aug 2016
  end-page: 10
  ident: br0800
  article-title: Defeating the database adversary using deception - a mysql database honeypot
  publication-title: 2016 International Conference on Software Security and Assurance (ICSSA)
– start-page: 1
  year: 2020
  end-page: 5
  ident: br0970
  article-title: Towards systematic honeytoken fingerprinting
  publication-title: 13th International Conference on Security of Information and Networks
– volume: 11
  start-page: 418
  year: 2020
  end-page: 435
  ident: br0250
  article-title: A review on honeypot-based botnet detection models for smart factory
  publication-title: Int. J. Adv. Comput. Sci. Appl.
– volume: 4
  start-page: 119
  year: 2007
  end-page: 136
  ident: br0680
  article-title: Fast worm containment using feedback control
  publication-title: IEEE Trans. Dependable Secure Comput.
– volume: 141
  start-page: 32
  year: 2018
  end-page: 51
  ident: br1550
  article-title: Multi-paradigm deception modeling for cyber defense
  publication-title: J. Syst. Softw.
– year: 2021
  ident: br1250
  article-title: Game Theory for Cyber Deception
– start-page: 127
  year: 2016
  end-page: 131
  ident: br0350
  article-title: Implementation of low interaction web server honeypot using cubieboard
  publication-title: 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)
– volume: 18
  start-page: 1
  year: 2016
  end-page: 21
  ident: br0940
  article-title: Behavioral study of users when interacting with active honeytokens
  publication-title: ACM Trans. Inf. Syst. Secur.
– start-page: 173
  year: 2015
  end-page: 206
  ident: br1190
  article-title: The human factor in cybersecurity: robust & intelligent defense
  publication-title: Cyber Warfare: Building the Scientific Foundation
– volume: 4
  start-page: 1
  year: 2014
  end-page: 14
  ident: br1000
  article-title: Social network attack simulation with honeytokens
  publication-title: Soc. Netw. Anal. Min.
– volume: 8
  start-page: 2474
  year: 2017
  end-page: 2482
  ident: br0510
  article-title: Strategic honeypot game model for distributed denial of service attacks in the smart grid
  publication-title: IEEE Trans. Smart Grid
– start-page: 93
  year: 2018
  end-page: 98
  ident: br0230
  article-title: Iot honeypot: a review from researcher's perspective
  publication-title: 2018 IEEE Conference on Application, Information and Network Security (AINS)
– volume: 9
  start-page: 911
  year: 2009
  end-page: 919
  ident: br0280
  article-title: Phoneyc: a virtual client honeypot
  publication-title: LEET
– start-page: 261
  year: 2015
  end-page: 270
  ident: br0880
  article-title: Defending against malicious usb firmware with goodusb
  publication-title: Proceedings of the 31st Annual Computer Security Applications Conference
– start-page: 2013
  year: 2013
  ident: br1160
  article-title: Improving security using deception
– volume: 51
  start-page: 2623
  year: 2015
  end-page: 2637
  ident: br1210
  article-title: Resilient and trustworthy dynamic data-driven application systems (dddas) services for crisis management environments
  publication-title: Proc. Comput. Sci.
– year: 2016
  ident: br1510
  article-title: Cyber Security Essentials
– volume: 13
  start-page: 1437
  year: 2023
  ident: br1640
  article-title: Containerized cloud-based honeypot deception for tracking attackers
  publication-title: Sci. Rep.
– year: 2023
  ident: br1720
  article-title: Accounting for Uncertainty in Deceptive Signaling for Cybersecurity
– start-page: 51
  year: 2019
  end-page: 61
  ident: br0430
  article-title: Characterizing background noise in ics traffic through a set of low interaction honeypots
  publication-title: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy
– start-page: 7
  year: 2009
  end-page: 16
  ident: br1380
  article-title: An attacker-defender game for honeynets
  publication-title: COCOON
– year: 2022
  ident: br1020
  article-title: Multi-Factor Authentication Mechanism Based on Browser Fingerprinting and Graphical Honeytokens
– start-page: 65
  year: 2019
  end-page: 80
  ident: br0520
  article-title: Behavioural analysis of recent ransomwares and prediction of future attacks by polymorphic and metamorphic ransomware
  publication-title: Computational Intelligence: Theories, Applications and Future Directions-Volume II
– volume: vol. 801
  start-page: 012057
  year: 2017
  ident: br0550
  article-title: Enhancing honeypot deception capability through network service fingerprinting
  publication-title: Journal of Physics: Conference Series
– start-page: 73
  year: 2023
  end-page: 90
  ident: br1860
  article-title: Revealing human attacker behaviors using an adaptive Internet of things honeypot ecosystem
  publication-title: IFIP International Conference on Digital Forensics
– volume: 9
  start-page: 415
  year: 2020
  ident: br0480
  article-title: Reputation management using honeypots for intrusion detection in the Internet of things
  publication-title: Electronics
– start-page: 93
  year: 2019
  end-page: 100
  ident: br0920
  article-title: A survey on honeypots, honeynets and their applications on smart grid
  publication-title: 2019 IEEE Conference on Network Softwarization (NetSoft)
– year: 2023
  ident: br2080
  article-title: A Longitudinal Analysis of Cyber Adversarial Tactics and Techniques
– start-page: 123
  year: 2017
  end-page: 130
  ident: br0690
  article-title: The dose makes the poison—leveraging uncertainty for effective malware detection
  publication-title: 2017 IEEE Conference on Dependable and Secure Computing
– year: 2021
  ident: br0260
  article-title: How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey
– start-page: 105
  year: 2020
  end-page: 129
  ident: br0050
  article-title: Identification and classification of cyber threats through ssh honeypot systems
  publication-title: Handbook of Research on Intrusion Detection Systems
– volume: 11
  start-page: 38
  year: 2017
  end-page: 45
  ident: br0400
  article-title: Versatile virtual honeynet management framework
  publication-title: IET Inf. Secur.
– start-page: 196
  year: 2019
  end-page: 216
  ident: br1460
  article-title: Adaptive honeypot engagement through reinforcement learning of semi-Markov decision processes
  publication-title: International Conference on Decision and Game Theory for Security
– start-page: 741
  year: 2009
  end-page: 755
  ident: br0600
  article-title: Self adaptive high interaction honeypots driven by game theory
  publication-title: Symposium on Self-Stabilizing Systems
– volume: 26
  start-page: 599
  year: 2023
  end-page: 612
  ident: br0070
  article-title: A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things
  publication-title: Clust. Comput.
– volume: 36
  start-page: 165
  year: 2022
  end-page: 174
  ident: br2000
  article-title: Ai-based autonomic and scalable security management architecture for secure network slicing in b5g
  publication-title: IEEE Netw.
– start-page: 1
  year: 2021
  end-page: 23
  ident: br0100
  article-title: A lightweight image encryption algorithm for secure communications in multimedia Internet of things
  publication-title: Wirel. Pers. Commun.
– volume: 5
  start-page: 232
  year: 2023
  end-page: 248
  ident: br1930
  article-title: An in-depth evaluation of hybrid approaches in soft computing for the identification of social engineering
  publication-title: J. Soft Comput. Paradig.
– start-page: 127
  year: 2014
  end-page: 138
  ident: br1560
  article-title: Planning and integrating deception into computer security defenses
  publication-title: Proceedings of the 2014 New Security Paradigms Workshop
– start-page: 18
  year: 2016
  end-page: 38
  ident: br1400
  article-title: Deception-based game theoretical approach to mitigate dos attacks
  publication-title: International Conference on Decision and Game Theory for Security
– volume: 23
  start-page: 4060
  year: 2023
  ident: br2090
  article-title: Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure
  publication-title: Sensors
– volume: 201
  year: 2022
  ident: br1680
  article-title: Honeyboost: boosting honeypot performance with data fusion and anomaly detection
  publication-title: Expert Syst. Appl.
– volume: 4
  start-page: 1
  year: 2023
  end-page: 38
  ident: br1920
  article-title: The role of machine learning in cybersecurity
  publication-title: Digit. Treats Res. Pract.
– start-page: 502
  year: 2020
  end-page: 506
  ident: br1370
  article-title: Honeypot allocation over attack graphs in cyber deception games
  publication-title: 2020 International Conference on Computing, Networking and Communications (ICNC)
– start-page: 1
  year: 2019
  end-page: 9
  ident: br1260
  article-title: Resiliency under strategic foresight: the effects of cybersecurity management and enterprise risk management alignment
  publication-title: 2019 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA)
– start-page: 39
  year: 2020
  end-page: 53
  ident: br0180
  article-title: A detailed analysis of intruders' activities in the network through the real-time virtual honeynet experimentation
  publication-title: Artificial Intelligence and Evolutionary Computations in Engineering Systems
– start-page: 630
  year: 2015
  end-page: 635
  ident: br0700
  article-title: Cloudhoneycy-an integrated honeypot framework for cloud infrastructures
  publication-title: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)
– volume: 64
  year: 2015
  ident: br1520
  article-title: Cyber denial, deception and counter deception
  publication-title: Adv. Inf. Secur.
– year: 2019
  ident: br0640
  article-title: Forge: a fake online repository generation engine for cyber deception
  publication-title: IEEE Trans. Dependable Secure Comput.
– start-page: 1
  year: 2021
  end-page: 7
  ident: br1450
  article-title: Reinforcement learning-assisted threshold optimization for dynamic honeypot adaptation to enhance iobt networks security
  publication-title: 2021 IEEE Symposium Series on Computational Intelligence (SSCI)
– volume: 50
  start-page: 80
  year: 2017
  end-page: 84
  ident: br0010
  article-title: Ddos in the iot: Mirai and other botnets
  publication-title: Computer
– volume: 2023
  year: 2023
  ident: br1730
  article-title: A comprehensive survey on machine learning-based intrusion detection systems for secure communication in Internet of things
  publication-title: Comput. Intell. Neurosci.
– start-page: 337
  year: 2022
  end-page: 355
  ident: br1040
  article-title: An approach to generate realistic http parameters for application layer deception
  publication-title: International Conference on Applied Cryptography and Network Security
– start-page: 1107
  year: 2022
  end-page: 1112
  ident: br1950
  article-title: Topotrust: a blockchain-based trustless and secure topology discovery in sdns
  publication-title: 2022 International Wireless Communications and Mobile Computing (IWCMC)
– start-page: 441
  year: 2018
  end-page: 446
  ident: br0730
  article-title: Qrassh-a self-adaptive ssh honeypot driven by q-learning
  publication-title: 2018 International Conference on Communications (COMM)
– start-page: 321
  year: 2007
  end-page: 326
  ident: br0960
  article-title: Honeypots: concepts, approaches, and challenges
  publication-title: Proceedings of the 45th Annual Southeast Regional Conference
– volume: 111
  start-page: 14
  year: 2014
  end-page: 14
  ident: br1080
  article-title: Bioreplicated visual features of nanofabricated buprestid beetle decoys evoke stereotypical male mating flights
  publication-title: Proc. Natl. Acad. Sci.
– start-page: 522
  year: 2019
  end-page: 526
  ident: br1360
  article-title: A game-theoretic framework for dynamic cyber deception in Internet of battlefield things
  publication-title: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
– start-page: 201
  year: 2012
  end-page: 220
  ident: br1310
  article-title: Game theoretic model of strategic honeypot selection in computer networks
  publication-title: International Conference on Decision and Game Theory for Security
– volume: 19
  start-page: 3438
  year: 2022
  end-page: 3452
  ident: br1980
  article-title: Honeypot allocation for cyber deception under uncertainty
  publication-title: IEEE Trans. Netw. Serv. Manag.
– volume: 16
  year: 2022
  ident: br1890
  article-title: Early intrusion detection system using honeypot for industrial control networks
  publication-title: Results Eng.
– start-page: 1
  year: 2017
  end-page: 9
  ident: br0900
  article-title: A novel sdn based stealthy tcp connection handover mechanism for hybrid honeypot systems
  publication-title: 2017 IEEE Conference on Network Softwarization (NetSoft)
– volume: 10
  start-page: 104
  year: 2022
  end-page: 104
  ident: br1760
  article-title: Honeycar: a framework to configure honeypot vulnerabilities on the Internet of vehicles
  publication-title: IEEE Access
– start-page: 1
  year: 2021
  end-page: 7
  ident: br1010
  article-title: A novel two-factor honeytoken authentication mechanism
  publication-title: 2021 International Conference on Computer Communications and Networks (ICCCN)
– start-page: 41
  year: 2022
  end-page: 57
  ident: br1700
  article-title: Adaptive cyberdefense with deception: a human–ai cognitive approach
  publication-title: Cyber Deception: Techniques, Strategies, and Human Aspects
– volume: 32
  start-page: 1384
  year: 2009
  end-page: 1399
  ident: br0870
  article-title: An auto-responsive honeypot architecture for dynamic resource allocation and qos adaptation in ddos attacked networks
  publication-title: Comput. Commun.
– volume: 106
  start-page: 505
  year: 2019
  end-page: 519
  ident: br2030
  article-title: Improving resources management in network virtualization by utilizing a software-based network
  publication-title: Wirel. Pers. Commun.
– start-page: 129
  year: 2011
  end-page: 136
  ident: br1120
  article-title: Game theory-based defense mechanisms against ddos attacks on tcp/tcp-friendly flows
  publication-title: 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
– start-page: 1417
  year: 2017
  end-page: 1421
  ident: br0090
  article-title: Feature selection and intrusion detection in cloud environment based on machine learning algorithms
  publication-title: 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)
– volume: 52
  start-page: 1
  year: 2019
  end-page: 28
  ident: br1610
  article-title: A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy
  publication-title: ACM Comput. Surv.
– start-page: 107
  year: June 2007
  end-page: 113
  ident: br1410
  article-title: Deception in honeynets: a game-theoretic analysis
  publication-title: 2007 IEEE SMC Information Assurance and Security Workshop
– start-page: 139
  year: 2023
  end-page: 144
  ident: br1770
  article-title: Enhancing cyber attribution through behavior similarity detection on Linux shell honeypots with att&ck framework
  publication-title: 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs)
– volume: 26
  start-page: 367
  year: 2023
  end-page: 384
  ident: br0060
  article-title: Dmaidps: a distributed multi-agent intrusion detection and prevention system for cloud iot environments
  publication-title: Clust. Comput.
– start-page: 77
  year: 2016
  end-page: 84
  ident: br1540
  article-title: Designing adaptive deception strategies
  publication-title: 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
– start-page: 1
  year: 2012
  end-page: 4
  ident: br1200
  article-title: Mimicry honeypot: a brief introduction
  publication-title: 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing
– start-page: 587
  year: 2023
  end-page: 598
  ident: br1870
  article-title: Honeypot for cybersecurity threat intelligence
  publication-title: IRC-SET 2022: Proceedings of the 8th IRC Conference on Science, Engineering and Technology, August 2022, Singapore
– year: 2018
  ident: br0220
  article-title: Demystifying deception technology: a survey
– volume: 15
  start-page: 127
  year: 2023
  ident: br1800
  article-title: A highly interactive honeypot-based approach to network threat management
  publication-title: Future Internet
– year: 2015
  ident: br1420
  article-title: Deception by design: evidence-based signaling games for network defense
– volume: 106
  year: 2021
  ident: br1170
  article-title: Three decades of deception techniques in active cyber defense-retrospect and outlook
  publication-title: Comput. Secur.
– start-page: 742
  year: 2022
  end-page: 755
  ident: br1130
  article-title: Interaction matters: a comprehensive analysis and a dataset of hybrid iot/ot honeypots
  publication-title: Proceedings of the 38th Annual Computer Security Applications Conference
– volume: 78
  start-page: 3477
  year: 2022
  end-page: 3499
  ident: br1940
  article-title: cTMvSDN: improving resource management using combination of Markov-process and tdma in software-defined networking
  publication-title: J. Supercomput.
– volume: 2
  start-page: 479
  year: 2022
  end-page: 486
  ident: br1830
  article-title: A virtual honeypot framework
  publication-title: Cent. Asian Res. J. Interdiscip. Stud.
– volume: 14
  start-page: 1098
  year: 2017
  end-page: 1112
  ident: br0720
  article-title: Deceiving network reconnaissance using sdn-based virtual topologies
  publication-title: IEEE Trans. Netw. Serv. Manag.
– start-page: 253
  year: 2007
  end-page: 258
  ident: br0540
  article-title: Metrics for measuring the effectiveness of decompilers and obfuscators
  publication-title: 15th IEEE International Conference on Program Comprehension (ICPC'07)
– year: 2023
  ident: br1690
  article-title: Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement
  publication-title: ACM Comput. Surv.
– year: 2012
  ident: br1280
  article-title: Performance analysis of cyber deception using probabilistic models
– start-page: 1002
  year: 2015
  end-page: 1009
  ident: br0150
  article-title: Taxonomy of honeynet solutions
  publication-title: 2015 SAI Intelligent Systems Conference (IntelliSys)
– volume: 40
  start-page: 69
  year: 2016
  ident: br1090
  article-title: Shady trick or legitimate tactic-can law enforcement officials use fictitious social media accounts to interact with suspects
  publication-title: Am. J. Trial Advoc.
– year: 2021
  ident: br1580
  article-title: Architectural Style: Distortions for Deploying and Managing Deception Technologies in Software Systems
– year: 2021
  ident: br0650
  article-title: Generating fake documents using probabilistic logic graphs
  publication-title: IEEE Trans. Dependable Secure Comput.
– volume: 97
  year: 2020
  ident: br1470
  article-title: A differential game method against attacks in heterogeneous honeynet
  publication-title: Comput. Secur.
– year: 2003
  ident: br0190
  article-title: Intrusion Detection with Snort
– year: 2023
  ident: br0990
  article-title: Hybrid cyber defense strategies using honey-x: a survey
  publication-title: Comput. Netw.
– volume: 17
  start-page: 135
  year: 2018
  end-page: 151
  ident: br0830
  article-title: Honeycirculator: distributing credential honeytoken for introspection of web-based attack cycle
  publication-title: Int. J. Inf. Secur.
– volume: 12
  start-page: 3906
  year: 2017
  end-page: 3919
  ident: br0160
  article-title: Enabling an anatomic view to investigate honeypot systems: a survey
  publication-title: IEEE Syst. J.
– volume: 92
  year: 2020
  ident: br1150
  article-title: A review and theoretical explanation of the ‘cyberthreat-intelligence (cti) capability’ that needs to be fostered in information security practitioners and how this can be accomplished
  publication-title: Comput. Secur.
– year: 2022
  ident: br2050
  article-title: Security Posture: A Systematic Review of Cyber Threats and Proactive Security
– start-page: 1
  year: 2014
  end-page: 12
  ident: br0710
  article-title: Keeping intruders at large: a graph-theoretic approach to reducing the probability of successful network intrusions
  publication-title: 2014 11th International Conference on Security and Cryptography (SECRYPT)
– start-page: 1
  year: 2012
  end-page: 5
  ident: br0310
  article-title: Hybrid honeypot framework for malware collection and analysis
  publication-title: 2012 IEEE 7th International Conference on Industrial and Information Systems (ICIIS)
– volume: 102
  year: 2022
  ident: br1530
  article-title: Using honeypots to model botnet attacks on the Internet of medical things
  publication-title: Comput. Electr. Eng.
– volume: 34
  start-page: 140
  year: 2020
  end-page: 147
  ident: br2040
  article-title: Ai for beyond 5g networks: a cyber-security defense or offense enabler?
  publication-title: IEEE Netw.
– volume: 4
  start-page: 63
  year: 2012
  ident: br0930
  article-title: A survey: recent advances and future trends in honeypot research
  publication-title: Int. J. Comput. Netw. Inf. Secur.
– start-page: 269
  year: 2023
  end-page: 278
  ident: br1960
  article-title: Sdn-based cyber deception deployment for proactive defense strategy using honey of things and cyber threat intelligence
  publication-title: International Conference on Intelligence of Things
– year: 2023
  ident: br0080
  article-title: Towards data security assessments using an ids security model for cyber-physical smart cities
  publication-title: Inf. Sci.
– volume: 2
  start-page: 25
  year: 2007
  end-page: 36
  ident: br0910
  article-title: Defending cyberspace with fake honeypots
  publication-title: J. Comput.
– volume: vol. 2
  year: 2017
  ident: br0780
  article-title: Enhancing security using honeywords
  publication-title: International Journal of Innovative Research and Creative Technology
– start-page: 1
  year: 2020
  end-page: 6
  ident: br1350
  article-title: Software diversity for cyber deception
  publication-title: GLOBECOM 2020-2020 IEEE Global Communications Conference
– start-page: 204
  year: 2017
  end-page: 207
  ident: br0370
  article-title: New techniques of malware detection using ftp honeypot systems
  publication-title: 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)
– volume: 2022
  start-page: 1
  year: 2022
  end-page: 13
  ident: br1880
  article-title: Multi-cloud integration security framework using honeypots
  publication-title: Mob. Inf. Syst.
– volume: 4
  start-page: 1162
  year: 2011
  end-page: 1172
  ident: br1390
  article-title: A game theoretic investigation of deception in network security
  publication-title: Secur. Commun. Netw.
– start-page: 93
  year: 2012
  end-page: 94
  ident: br0820
  article-title: Software decoys for insider threat
  publication-title: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
– start-page: 410
  year: 2010
  end-page: 417
  ident: br0300
  article-title: Honeyware: a web-based low interaction client honeypot
  publication-title: 2010 Third International Conference on Software Testing, Verification, and Validation Workshops
– start-page: 915
  year: 2009
  end-page: 921
  ident: br0560
  article-title: Design considerations for a honeypot for sql injection attacks
  publication-title: 2009 IEEE 34th Conference on Local Computer Networks
– volume: 2
  start-page: 154
  year: 2022
  end-page: 190
  ident: br0500
  article-title: Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: a survey
  publication-title: J. Cybersecur. Priv.
– start-page: 155
  year: 2022
  end-page: 169
  ident: br1790
  article-title: Attacker attribution via characteristics inference using honeypot data
  publication-title: International Conference on Network and System Security
– start-page: 25
  year: 2016
  end-page: 52
  ident: br0130
  article-title: Cyber security deception
  publication-title: Cyber Deception
– start-page: 1
  year: 2019
  end-page: 9
  ident: br0240
  article-title: Current state of honeypots and deception strategies in cybersecurity
  publication-title: 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
– start-page: 228
  year: 2015
  end-page: 249
  ident: br1340
  article-title: Approximate solutions for attack graph games with imperfect information
  publication-title: International Conference on Decision and Game Theory for Security
– year: 2022
  ident: br2110
  article-title: Anomaly Detection Framework and Deep Learning Techniques for Zero-Day Attack in Container Based Environment
– volume: 13
  start-page: 597
  year: 2021
  ident: br1220
  article-title: Threat defense: cyber deception approach and education for resilience in hybrid threats model
  publication-title: Symmetry
– start-page: 167
  year: 1989
  end-page: 177
  ident: br1490
  article-title: Nash equilibrium
  publication-title: Game Theory
– start-page: 1
  year: Dec 2015
  end-page: 6
  ident: br0200
  article-title: Optimized virtual honeynet with implementation of host machine as honeywall
  publication-title: 2015 Annual IEEE India Conference (INDICON)
– volume: vol. 1
  start-page: 758
  year: 2020
  end-page: 762
  ident: br0590
  article-title: Research on Building Exploitable Vulnerability Database for Cloud-Native App
  publication-title: 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)
– start-page: 1
  year: 2022
  end-page: 3
  ident: br2010
  article-title: Demo paper: caught in my radio net-experiment with honeypots in radio access networks
  publication-title: 2022 25th Conference on Innovation in Clouds, Internet and Networks (ICIN)
– year: 2022
  ident: br1230
  article-title: Modeling Deception for Cyber Security
– volume: 37
  start-page: 683
  year: 2019
  end-page: 697
  ident: br0440
  article-title: Honeydoc: an efficient honeypot architecture enabling all-round design
  publication-title: IEEE J. Sel. Areas Commun.
– year: 2007
  ident: br0270
  article-title: Characterizing the irc-based botnet phenomenon
– year: 2013
  ident: br1070
  article-title: Bait and Snitch: Defending Computer Systems with Decoys
– year: 2022
  ident: br2070
  article-title: Apache Log4j Logging Framework and Its Vulnerability
– volume: 51
  start-page: 1
  year: 2018
  end-page: 36
  ident: br1630
  article-title: Deception techniques in computer security: a research perspective
  publication-title: ACM Comput. Surv.
– start-page: 1
  year: 2016
  ident: 10.1016/j.cose.2024.103792_br0170
  article-title: Honeymix: toward sdn-based intelligent honeynet
– volume: 116
  start-page: 76
  year: 2021
  ident: 10.1016/j.cose.2024.103792_br1480
  article-title: A theoretical method to evaluate honeynet potency
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2020.08.021
– volume: 11
  start-page: 418
  issue: 6
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br0250
  article-title: A review on honeypot-based botnet detection models for smart factory
  publication-title: Int. J. Adv. Comput. Sci. Appl.
– volume: 8
  start-page: 2474
  issue: 5
  year: 2017
  ident: 10.1016/j.cose.2024.103792_br0510
  article-title: Strategic honeypot game model for distributed denial of service attacks in the smart grid
  publication-title: IEEE Trans. Smart Grid
  doi: 10.1109/TSG.2017.2670144
– year: 2023
  ident: 10.1016/j.cose.2024.103792_br0990
  article-title: Hybrid cyber defense strategies using honey-x: a survey
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2023.109776
– volume: 24
  start-page: 522
  issue: 3
  year: 2016
  ident: 10.1016/j.cose.2024.103792_br0360
  article-title: Iotpot: a novel honeypot for revealing current iot threats
  publication-title: J. Inf. Process.
– year: 2021
  ident: 10.1016/j.cose.2024.103792_br0650
  article-title: Generating fake documents using probabilistic logic graphs
  publication-title: IEEE Trans. Dependable Secure Comput.
– ident: 10.1016/j.cose.2024.103792_br0220
– year: 2022
  ident: 10.1016/j.cose.2024.103792_br2110
– volume: 16
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1890
  article-title: Early intrusion detection system using honeypot for industrial control networks
  publication-title: Results Eng.
  doi: 10.1016/j.rineng.2022.100576
– start-page: 375
  year: 2019
  ident: 10.1016/j.cose.2024.103792_br0450
  article-title: Dynamic virtual network honeypot
– volume: 130
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br1710
  article-title: Cyber expert feedback: experiences, expectations, and opinions about cyber deception
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2023.103268
– start-page: 77
  year: 2016
  ident: 10.1016/j.cose.2024.103792_br1540
  article-title: Designing adaptive deception strategies
– year: 2022
  ident: 10.1016/j.cose.2024.103792_br1230
– volume: 52
  start-page: 1
  issue: 4
  year: 2019
  ident: 10.1016/j.cose.2024.103792_br1610
  article-title: A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy
  publication-title: ACM Comput. Surv.
  doi: 10.1145/3337772
– volume: 5
  start-page: 178
  issue: 1
  year: 1982
  ident: 10.1016/j.cose.2024.103792_br1600
  article-title: Toward a general theory of deception
  publication-title: J. Strateg. Stud.
  doi: 10.1080/01402398208437106
– volume: 2
  start-page: 479
  issue: 5
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1830
  article-title: A virtual honeypot framework
  publication-title: Cent. Asian Res. J. Interdiscip. Stud.
– start-page: 156
  year: 2018
  ident: 10.1016/j.cose.2024.103792_br1300
  article-title: Strategic defense and attack in deception based network security
– volume: 34
  start-page: 140
  issue: 6
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br2040
  article-title: Ai for beyond 5g networks: a cyber-security defense or offense enabler?
  publication-title: IEEE Netw.
  doi: 10.1109/MNET.011.2000088
– ident: 10.1016/j.cose.2024.103792_br0420
– volume: 22
  start-page: 8046
  issue: 20
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1900
  article-title: Interleaved honeypot-framing model with secure mac policies for wireless sensor networks
  publication-title: Sensors
  doi: 10.3390/s22208046
– start-page: 741
  year: 2009
  ident: 10.1016/j.cose.2024.103792_br0600
  article-title: Self adaptive high interaction honeypots driven by game theory
– volume: 13
  start-page: 284
  issue: 2
  year: 2016
  ident: 10.1016/j.cose.2024.103792_br0790
  article-title: Achieving flatness: selecting the honeywords from existing user passwords
  publication-title: IEEE Trans. Dependable Secure Comput.
  doi: 10.1109/TDSC.2015.2406707
– start-page: 73
  year: 2016
  ident: 10.1016/j.cose.2024.103792_br0850
  article-title: Honey pot: a major technique for intrusion detection
– volume: 13
  start-page: 210
  issue: 4
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1780
  article-title: Systematic review of graphical visual methods in honeypot attack data analysis
  publication-title: J. Inf. Secur.
– volume: 975
  start-page: 8887
  year: 2013
  ident: 10.1016/j.cose.2024.103792_br0320
  article-title: Design and implementation of a medium interaction honeypot
  publication-title: Int. J. Comput. Appl.
– volume: 114
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1670
  article-title: Don't get stung, cover your ics in honey: how do honeypots fit within industrial control system security
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2021.102598
– start-page: 127
  year: 2016
  ident: 10.1016/j.cose.2024.103792_br0350
  article-title: Implementation of low interaction web server honeypot using cubieboard
– volume: 141
  start-page: 339
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br1840
  article-title: The dag blockchain: a secure edge assisted honeypot for attack detection and multi-controller based load balancing in sdn 5g
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2022.11.008
– start-page: 2013
  year: 2013
  ident: 10.1016/j.cose.2024.103792_br1160
– start-page: 1
  year: 2019
  ident: 10.1016/j.cose.2024.103792_br1260
  article-title: Resiliency under strategic foresight: the effects of cybersecurity management and enterprise risk management alignment
– start-page: 228
  year: 2015
  ident: 10.1016/j.cose.2024.103792_br1340
  article-title: Approximate solutions for attack graph games with imperfect information
– start-page: 16
  year: 2015
  ident: 10.1016/j.cose.2024.103792_br0340
  article-title: Intercept+: Sdn support for live migration-based honeypots
– start-page: 1
  year: 2021
  ident: 10.1016/j.cose.2024.103792_br0740
  article-title: An adaptive honeypot using q-learning with severity analyzer
  publication-title: J. Ambient Intell. Humaniz. Comput.
– volume: 26
  start-page: 367
  issue: 1
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br0060
  article-title: Dmaidps: a distributed multi-agent intrusion detection and prevention system for cloud iot environments
  publication-title: Clust. Comput.
  doi: 10.1007/s10586-022-03621-3
– start-page: 742
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1130
  article-title: Interaction matters: a comprehensive analysis and a dataset of hybrid iot/ot honeypots
– year: 2023
  ident: 10.1016/j.cose.2024.103792_br1140
– volume: 2
  start-page: 25
  issue: 2
  year: 2007
  ident: 10.1016/j.cose.2024.103792_br0910
  article-title: Defending cyberspace with fake honeypots
  publication-title: J. Comput.
  doi: 10.4304/jcp.2.2.25-36
– year: 2022
  ident: 10.1016/j.cose.2024.103792_br2070
– volume: 9
  start-page: 415
  issue: 3
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br0480
  article-title: Reputation management using honeypots for intrusion detection in the Internet of things
  publication-title: Electronics
  doi: 10.3390/electronics9030415
– start-page: 41
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1700
  article-title: Adaptive cyberdefense with deception: a human–ai cognitive approach
– volume: vol. 2
  year: 2017
  ident: 10.1016/j.cose.2024.103792_br0780
  article-title: Enhancing security using honeywords
– volume: 2023
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br1730
  article-title: A comprehensive survey on machine learning-based intrusion detection systems for secure communication in Internet of things
  publication-title: Comput. Intell. Neurosci.
  doi: 10.1155/2023/8981988
– start-page: 1
  year: 2015
  ident: 10.1016/j.cose.2024.103792_br0200
  article-title: Optimized virtual honeynet with implementation of host machine as honeywall
– start-page: 93
  year: 2012
  ident: 10.1016/j.cose.2024.103792_br0820
  article-title: Software decoys for insider threat
– start-page: 195
  year: 2017
  ident: 10.1016/j.cose.2024.103792_br0580
  article-title: Increasing the attractiveness of false objects of attack on the web-servers
– start-page: 25
  year: 2016
  ident: 10.1016/j.cose.2024.103792_br0130
  article-title: Cyber security deception
– volume: 12
  start-page: 2993
  issue: 2
  year: 2021
  ident: 10.1016/j.cose.2024.103792_br0490
  article-title: An intelligent botnet blocking approach in software defined networks using honeypots
  publication-title: J. Ambient Intell. Humaniz. Comput.
  doi: 10.1007/s12652-020-02461-6
– year: 2023
  ident: 10.1016/j.cose.2024.103792_br1690
  article-title: Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement
  publication-title: ACM Comput. Surv.
  doi: 10.1145/3582077
– start-page: 1
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1910
  article-title: Icspot: a high-interaction honeypot for industrial control systems
– year: 2023
  ident: 10.1016/j.cose.2024.103792_br1740
– year: 2021
  ident: 10.1016/j.cose.2024.103792_br1580
– start-page: 341
  year: 2018
  ident: 10.1016/j.cose.2024.103792_br0750
  article-title: Using reinforcement learning to conceal honeypot functionality
– volume: 37
  start-page: 683
  issue: 3
  year: 2019
  ident: 10.1016/j.cose.2024.103792_br0440
  article-title: Honeydoc: an efficient honeypot architecture enabling all-round design
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2019.2894307
– year: 2022
  ident: 10.1016/j.cose.2024.103792_br2050
– start-page: 1
  year: 2021
  ident: 10.1016/j.cose.2024.103792_br1010
  article-title: A novel two-factor honeytoken authentication mechanism
– volume: 50
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br1660
  article-title: Flow based containerized honeypot approach for network traffic analysis: an empirical study
  publication-title: Comput. Sci. Rev.
  doi: 10.1016/j.cosrev.2023.100600
– volume: 4
  start-page: 1
  year: 2014
  ident: 10.1016/j.cose.2024.103792_br1000
  article-title: Social network attack simulation with honeytokens
  publication-title: Soc. Netw. Anal. Min.
  doi: 10.1007/s13278-014-0221-5
– volume: 92
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br1150
  article-title: A review and theoretical explanation of the ‘cyberthreat-intelligence (cti) capability’ that needs to be fostered in information security practitioners and how this can be accomplished
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2020.101761
– start-page: 127
  year: 2014
  ident: 10.1016/j.cose.2024.103792_br1560
  article-title: Planning and integrating deception into computer security defenses
– volume: vol. 1
  start-page: 69
  year: 2010
  ident: 10.1016/j.cose.2024.103792_br0290
  article-title: A malware sample capturing and tracking system
– start-page: 167
  year: 1989
  ident: 10.1016/j.cose.2024.103792_br1490
  article-title: Nash equilibrium
– start-page: 131
  year: 2011
  ident: 10.1016/j.cose.2024.103792_br0770
  article-title: Honeygen: an automated honeytokens generator
– year: 2022
  ident: 10.1016/j.cose.2024.103792_br1650
– start-page: 1
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br1350
  article-title: Software diversity for cyber deception
– start-page: 1
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br2010
  article-title: Demo paper: caught in my radio net-experiment with honeypots in radio access networks
– start-page: 139
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br1770
  article-title: Enhancing cyber attribution through behavior similarity detection on Linux shell honeypots with att&ck framework
– volume: 97
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br1470
  article-title: A differential game method against attacks in heterogeneous honeynet
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2020.101870
– start-page: 1
  year: 2012
  ident: 10.1016/j.cose.2024.103792_br0310
  article-title: Hybrid honeypot framework for malware collection and analysis
– start-page: 441
  year: 2018
  ident: 10.1016/j.cose.2024.103792_br0730
  article-title: Qrassh-a self-adaptive ssh honeypot driven by q-learning
– year: 2016
  ident: 10.1016/j.cose.2024.103792_br0140
– volume: vol. 801
  start-page: 012057
  year: 2017
  ident: 10.1016/j.cose.2024.103792_br0550
  article-title: Enhancing honeypot deception capability through network service fingerprinting
– start-page: 115
  year: 2018
  ident: 10.1016/j.cose.2024.103792_br1440
  article-title: Optimal placement of honeypots for network defense
– volume: vol. 6
  year: 2006
  ident: 10.1016/j.cose.2024.103792_br0620
  article-title: Measuring the effectiveness of honeypot counter-counterdeception
– start-page: 107
  year: 2007
  ident: 10.1016/j.cose.2024.103792_br1410
  article-title: Deception in honeynets: a game-theoretic analysis
– volume: 13
  start-page: 597
  issue: 4
  year: 2021
  ident: 10.1016/j.cose.2024.103792_br1220
  article-title: Threat defense: cyber deception approach and education for resilience in hybrid threats model
  publication-title: Symmetry
  doi: 10.3390/sym13040597
– start-page: 1
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br0470
  article-title: A scalable high-interaction physical honeypot framework for programmable logic controller
– volume: 201
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1680
  article-title: Honeyboost: boosting honeypot performance with data fusion and anomaly detection
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2022.117073
– year: 2015
  ident: 10.1016/j.cose.2024.103792_br1330
  article-title: Optimal network security hardening using attack graph games
– start-page: 21
  year: 2015
  ident: 10.1016/j.cose.2024.103792_br1290
  article-title: Probabilistic performance analysis of moving target and deception reconnaissance defenses
– volume: 30
  start-page: 737
  issue: 6
  year: 2009
  ident: 10.1016/j.cose.2024.103792_br0530
  article-title: Refined metrics for measuring ideation effectiveness
  publication-title: Des. Stud.
  doi: 10.1016/j.destud.2009.07.002
– volume: 64
  year: 2015
  ident: 10.1016/j.cose.2024.103792_br1520
  article-title: Cyber denial, deception and counter deception
  publication-title: Adv. Inf. Secur.
– year: 2017
  ident: 10.1016/j.cose.2024.103792_br0390
– start-page: 155
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1790
  article-title: Attacker attribution via characteristics inference using honeypot data
– year: 2003
  ident: 10.1016/j.cose.2024.103792_br0190
– year: 2023
  ident: 10.1016/j.cose.2024.103792_br0080
  article-title: Towards data security assessments using an ids security model for cyber-physical smart cities
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2023.119530
– volume: 2022
  start-page: 1
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1880
  article-title: Multi-cloud integration security framework using honeypots
  publication-title: Mob. Inf. Syst.
– start-page: 587
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br1870
  article-title: Honeypot for cybersecurity threat intelligence
– start-page: 201
  year: 2012
  ident: 10.1016/j.cose.2024.103792_br1310
  article-title: Game theoretic model of strategic honeypot selection in computer networks
– start-page: 65
  year: 2019
  ident: 10.1016/j.cose.2024.103792_br0520
  article-title: Behavioural analysis of recent ransomwares and prediction of future attacks by polymorphic and metamorphic ransomware
– start-page: 1417
  year: 2017
  ident: 10.1016/j.cose.2024.103792_br0090
  article-title: Feature selection and intrusion detection in cloud environment based on machine learning algorithms
– start-page: 502
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br1370
  article-title: Honeypot allocation over attack graphs in cyber deception games
– start-page: 129
  year: 2011
  ident: 10.1016/j.cose.2024.103792_br1120
  article-title: Game theory-based defense mechanisms against ddos attacks on tcp/tcp-friendly flows
– start-page: 51
  year: 2009
  ident: 10.1016/j.cose.2024.103792_br1050
  article-title: Baiting inside attackers using decoy documents
– volume: 18
  start-page: 1
  issue: 3
  year: 2016
  ident: 10.1016/j.cose.2024.103792_br0940
  article-title: Behavioral study of users when interacting with active honeytokens
  publication-title: ACM Trans. Inf. Syst. Secur.
  doi: 10.1145/2854152
– start-page: 1107
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1950
  article-title: Topotrust: a blockchain-based trustless and secure topology discovery in sdns
– start-page: 13
  year: 2012
  ident: 10.1016/j.cose.2024.103792_br0860
  article-title: Fast dynamic extracted honeypots in cloud computing
– start-page: 321
  year: 2007
  ident: 10.1016/j.cose.2024.103792_br0960
  article-title: Honeypots: concepts, approaches, and challenges
– start-page: 1
  year: 2012
  ident: 10.1016/j.cose.2024.103792_br1200
  article-title: Mimicry honeypot: a brief introduction
– volume: 6
  start-page: 39
  issue: 1
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1810
  article-title: Sd-honeypot integration for mitigating ddos attack using machine learning approaches
  publication-title: JOIV: Int. J. Inform. Vis.
  doi: 10.30630/joiv.6.1.853
– start-page: 337
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1040
  article-title: An approach to generate realistic http parameters for application layer deception
– volume: 106
  year: 2021
  ident: 10.1016/j.cose.2024.103792_br1170
  article-title: Three decades of deception techniques in active cyber defense-retrospect and outlook
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2021.102288
– volume: 22
  start-page: 2194
  issue: 6
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1100
  article-title: Leveraging computational intelligence techniques for defensive deception: a review, recent advances, open problems and future directions
  publication-title: Sensors
  doi: 10.3390/s22062194
– start-page: 101
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br0950
  article-title: Honeysweeper: towards stealthy honeytoken fingerprinting techniques
– year: 2021
  ident: 10.1016/j.cose.2024.103792_br0260
– volume: 78
  start-page: 3477
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1940
  article-title: cTMvSDN: improving resource management using combination of Markov-process and tdma in software-defined networking
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-021-03871-9
– start-page: 81
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br0120
  article-title: A mathematical model for analyzing honeynets and their cyber deception techniques
– ident: 10.1016/j.cose.2024.103792_br1420
– start-page: 1
  year: 2014
  ident: 10.1016/j.cose.2024.103792_br0330
  article-title: The art of false alarms in the game of deception: leveraging fake honeypots for enhanced security
– volume: 10
  start-page: 104671
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1760
  article-title: Honeycar: a framework to configure honeypot vulnerabilities on the Internet of vehicles
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3210117
– volume: 4
  start-page: 1
  issue: 1
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br1920
  article-title: The role of machine learning in cybersecurity
  publication-title: Digit. Treats Res. Pract.
  doi: 10.1145/3545574
– volume: 4
  start-page: 1162
  issue: 10
  year: 2011
  ident: 10.1016/j.cose.2024.103792_br1390
  article-title: A game theoretic investigation of deception in network security
  publication-title: Secur. Commun. Netw.
  doi: 10.1002/sec.242
– start-page: 1127
  year: 2021
  ident: 10.1016/j.cose.2024.103792_br0210
  article-title: Examining the efficacy of decoy-based and psychological cyber deception
– start-page: 51
  year: 2019
  ident: 10.1016/j.cose.2024.103792_br0430
  article-title: Characterizing background noise in ics traffic through a set of low interaction honeypots
– start-page: 81
  year: 2015
  ident: 10.1016/j.cose.2024.103792_br1320
  article-title: Game-theoretic foundations for the strategic use of honeypots in network security
– start-page: 1
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br1060
  article-title: Towards a believable decoy system: replaying network activities from real system
– volume: 32
  start-page: 1384
  issue: 12
  year: 2009
  ident: 10.1016/j.cose.2024.103792_br0870
  article-title: An auto-responsive honeypot architecture for dynamic resource allocation and qos adaptation in ddos attacked networks
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2009.03.005
– year: 2022
  ident: 10.1016/j.cose.2024.103792_br1020
– start-page: 173
  year: 2015
  ident: 10.1016/j.cose.2024.103792_br1190
  article-title: The human factor in cybersecurity: robust & intelligent defense
– volume: 19
  start-page: 3438
  issue: 3
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1980
  article-title: Honeypot allocation for cyber deception under uncertainty
  publication-title: IEEE Trans. Netw. Serv. Manag.
  doi: 10.1109/TNSM.2022.3179965
– volume: 4
  start-page: 373
  year: 2015
  ident: 10.1016/j.cose.2024.103792_br0670
  article-title: Improving deception capability in honeynet through data manipulation
  publication-title: J. Internet Technol. Secur. Trans.
  doi: 10.20533/jitst.2046.3723.2015.0047
– year: 2021
  ident: 10.1016/j.cose.2024.103792_br1250
– volume: 106
  start-page: 505
  issue: 2
  year: 2019
  ident: 10.1016/j.cose.2024.103792_br2030
  article-title: Improving resources management in network virtualization by utilizing a software-based network
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-019-06176-6
– year: 2023
  ident: 10.1016/j.cose.2024.103792_br1720
– start-page: 7
  year: 2009
  ident: 10.1016/j.cose.2024.103792_br1380
  article-title: An attacker-defender game for honeynets
– year: 2023
  ident: 10.1016/j.cose.2024.103792_br1990
  article-title: Reinforcement learning-based slice isolation against ddos attacks in beyond 5g networks
  publication-title: IEEE Trans. Netw. Serv. Manag.
  doi: 10.1109/TNSM.2023.3254581
– volume: 13
  start-page: 1437
  issue: 1
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br1640
  article-title: Containerized cloud-based honeypot deception for tracking attackers
  publication-title: Sci. Rep.
  doi: 10.1038/s41598-023-28613-0
– volume: 75
  start-page: 8312
  year: 2019
  ident: 10.1016/j.cose.2024.103792_br0980
  article-title: Detecting and confronting flash attacks from iot botnets
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-019-03005-2
– start-page: 410
  year: 2010
  ident: 10.1016/j.cose.2024.103792_br0300
  article-title: Honeyware: a web-based low interaction client honeypot
– volume: vol. 11
  start-page: 145
  year: 2013
  ident: 10.1016/j.cose.2024.103792_br0760
  article-title: Honeywords: making password-cracking detectable
– start-page: 01
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br2120
  article-title: Defense-in-depth security strategy in log4j vulnerability analysis
– start-page: 4173
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br0040
  article-title: A cost-effective mtd approach for ddos attacks in software-defined networks
– start-page: 1
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br0970
  article-title: Towards systematic honeytoken fingerprinting
– volume: 122
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1850
  article-title: Use of cyber attack and defense agents in cyber ranges: a case study
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2022.102892
– volume: 23
  start-page: 2460
  issue: 4
  year: 2021
  ident: 10.1016/j.cose.2024.103792_br1240
  article-title: A survey of defensive deception: approaches using game theory and machine learning
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2021.3102874
– volume: 18
  start-page: 667
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br0030
  article-title: SCEMA: an SDN-oriented cost-effective edge-based MTD approach
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2022.3220939
– start-page: 93
  year: 2018
  ident: 10.1016/j.cose.2024.103792_br0230
  article-title: Iot honeypot: a review from researcher's perspective
– start-page: 1
  year: 2017
  ident: 10.1016/j.cose.2024.103792_br0380
  article-title: Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot
– volume: 50
  start-page: 80
  issue: 7
  year: 2017
  ident: 10.1016/j.cose.2024.103792_br0010
  article-title: Ddos in the iot: Mirai and other botnets
  publication-title: Computer
  doi: 10.1109/MC.2017.201
– start-page: 75
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1750
  article-title: Performance evaluation of intrusion detection system performance for traffic anomaly detection based on active ip reputation rules
– start-page: 105
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br0050
  article-title: Identification and classification of cyber threats through ssh honeypot systems
– start-page: 1
  year: 2014
  ident: 10.1016/j.cose.2024.103792_br0710
  article-title: Keeping intruders at large: a graph-theoretic approach to reducing the probability of successful network intrusions
– start-page: 253
  year: 2007
  ident: 10.1016/j.cose.2024.103792_br0540
  article-title: Metrics for measuring the effectiveness of decompilers and obfuscators
– start-page: 1002
  year: 2015
  ident: 10.1016/j.cose.2024.103792_br0150
  article-title: Taxonomy of honeynet solutions
– volume: 12
  start-page: 3906
  issue: 4
  year: 2017
  ident: 10.1016/j.cose.2024.103792_br0160
  article-title: Enabling an anatomic view to investigate honeypot systems: a survey
  publication-title: IEEE Syst. J.
  doi: 10.1109/JSYST.2017.2762161
– volume: 17
  start-page: 135
  issue: 2
  year: 2018
  ident: 10.1016/j.cose.2024.103792_br0830
  article-title: Honeycirculator: distributing credential honeytoken for introspection of web-based attack cycle
  publication-title: Int. J. Inf. Secur.
  doi: 10.1007/s10207-017-0361-5
– start-page: 6
  year: 2016
  ident: 10.1016/j.cose.2024.103792_br0800
  article-title: Defeating the database adversary using deception - a mysql database honeypot
– volume: 26
  start-page: 599
  issue: 1
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br0070
  article-title: A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things
  publication-title: Clust. Comput.
  doi: 10.1007/s10586-022-03629-9
– year: 2022
  ident: 10.1016/j.cose.2024.103792_br2060
– volume: 4
  start-page: 119
  issue: 2
  year: 2007
  ident: 10.1016/j.cose.2024.103792_br0680
  article-title: Fast worm containment using feedback control
  publication-title: IEEE Trans. Dependable Secure Comput.
  doi: 10.1109/TDSC.2007.1002
– volume: 110
  start-page: 1057
  issue: 2
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br1970
  article-title: Providing a way to create balance between reliability and delays in sdn networks by using the appropriate placement of controllers
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-019-06773-5
– start-page: 1
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br0570
  article-title: Neuralpot: an industrial honeypot implementation based on deep neural networks
– volume: 9
  start-page: 911
  year: 2009
  ident: 10.1016/j.cose.2024.103792_br0280
  article-title: Phoneyc: a virtual client honeypot
  publication-title: LEET
– volume: 15
  start-page: 127
  issue: 4
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br1800
  article-title: A highly interactive honeypot-based approach to network threat management
  publication-title: Future Internet
  doi: 10.3390/fi15040127
– volume: 14
  start-page: 1871
  issue: 7
  year: 2018
  ident: 10.1016/j.cose.2024.103792_br1430
  article-title: Modeling and analysis of leaky deception using signaling games with evidence
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2018.2886472
– year: 2023
  ident: 10.1016/j.cose.2024.103792_br2080
– volume: 36
  start-page: 165
  issue: 6
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br2000
  article-title: Ai-based autonomic and scalable security management architecture for secure network slicing in b5g
  publication-title: IEEE Netw.
  doi: 10.1109/MNET.104.2100495
– volume: 14
  start-page: 1098
  issue: 4
  year: 2017
  ident: 10.1016/j.cose.2024.103792_br0720
  article-title: Deceiving network reconnaissance using sdn-based virtual topologies
  publication-title: IEEE Trans. Netw. Serv. Manag.
  doi: 10.1109/TNSM.2017.2724239
– start-page: 196
  year: 2019
  ident: 10.1016/j.cose.2024.103792_br1460
  article-title: Adaptive honeypot engagement through reinforcement learning of semi-Markov decision processes
– volume: 5
  start-page: 232
  issue: 3
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br1930
  article-title: An in-depth evaluation of hybrid approaches in soft computing for the identification of social engineering
  publication-title: J. Soft Comput. Paradig.
  doi: 10.36548/jscp.2023.3.002
– year: 2007
  ident: 10.1016/j.cose.2024.103792_br0270
– volume: 102
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br1530
  article-title: Using honeypots to model botnet attacks on the Internet of medical things
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2022.108212
– volume: vol. 1
  start-page: 758
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br0590
  article-title: Research on Building Exploitable Vulnerability Database for Cloud-Native App
– volume: 40
  start-page: 69
  year: 2016
  ident: 10.1016/j.cose.2024.103792_br1090
  article-title: Shady trick or legitimate tactic-can law enforcement officials use fictitious social media accounts to interact with suspects
  publication-title: Am. J. Trial Advoc.
– volume: 2
  start-page: 154
  issue: 1
  year: 2022
  ident: 10.1016/j.cose.2024.103792_br0500
  article-title: Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: a survey
  publication-title: J. Cybersecur. Priv.
  doi: 10.3390/jcp2010010
– volume: 51
  start-page: 1
  issue: 4
  year: 2018
  ident: 10.1016/j.cose.2024.103792_br1630
  article-title: Deception techniques in computer security: a research perspective
  publication-title: ACM Comput. Surv.
  doi: 10.1145/3214305
– start-page: 915
  year: 2009
  ident: 10.1016/j.cose.2024.103792_br0560
  article-title: Design considerations for a honeypot for sql injection attacks
– year: 2020
  ident: 10.1016/j.cose.2024.103792_br0460
  article-title: D-fri-honeypot: a secure sting operation for hacking the hackers using dynamic fuzzy rule interpolation
  publication-title: IEEE Trans. Emerg. Top. Comput. Intell.
  doi: 10.1109/TETCI.2020.3023447
– start-page: 93
  year: 2019
  ident: 10.1016/j.cose.2024.103792_br0920
  article-title: A survey on honeypots, honeynets and their applications on smart grid
– start-page: 204
  year: 2017
  ident: 10.1016/j.cose.2024.103792_br0370
  article-title: New techniques of malware detection using ftp honeypot systems
– volume: 11
  start-page: 249
  issue: 1
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br2100
  article-title: Retaliation against ransomware in cloud-enabled pureos system
  publication-title: Mathematics
  doi: 10.3390/math11010249
– start-page: 1
  year: 2021
  ident: 10.1016/j.cose.2024.103792_br0100
  article-title: A lightweight image encryption algorithm for secure communications in multimedia Internet of things
  publication-title: Wirel. Pers. Commun.
– start-page: 6662
  year: 2012
  ident: 10.1016/j.cose.2024.103792_br0610
  article-title: A game theoretic investigation for high interaction honeypots
– start-page: 3
  year: 2019
  ident: 10.1016/j.cose.2024.103792_br0630
  article-title: Using deep learning to generate relational honeydata
– start-page: 522
  year: 2019
  ident: 10.1016/j.cose.2024.103792_br1360
  article-title: A game-theoretic framework for dynamic cyber deception in Internet of battlefield things
– start-page: 1
  year: 2019
  ident: 10.1016/j.cose.2024.103792_br0240
  article-title: Current state of honeypots and deception strategies in cybersecurity
– start-page: 630
  year: 2015
  ident: 10.1016/j.cose.2024.103792_br0700
  article-title: Cloudhoneycy-an integrated honeypot framework for cloud infrastructures
– year: 2012
  ident: 10.1016/j.cose.2024.103792_br1280
– start-page: 21
  year: 2018
  ident: 10.1016/j.cose.2024.103792_br0660
  article-title: Defending web servers with feints, distraction and obfuscation
– volume: 3
  start-page: 1025
  issue: 6
  year: 2016
  ident: 10.1016/j.cose.2024.103792_br0840
  article-title: Deceptive attack and defense game in honeypot-enabled networks for the Internet of things
  publication-title: IEEE Int. Things J.
  doi: 10.1109/JIOT.2016.2547994
– start-page: 261
  year: 2015
  ident: 10.1016/j.cose.2024.103792_br0880
  article-title: Defending against malicious usb firmware with goodusb
– volume: 4
  start-page: 63
  issue: 10
  year: 2012
  ident: 10.1016/j.cose.2024.103792_br0930
  article-title: A survey: recent advances and future trends in honeypot research
  publication-title: Int. J. Comput. Netw. Inf. Secur.
– start-page: 73
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br1860
  article-title: Revealing human attacker behaviors using an adaptive Internet of things honeypot ecosystem
– year: 2016
  ident: 10.1016/j.cose.2024.103792_br1510
– start-page: 1
  year: 2021
  ident: 10.1016/j.cose.2024.103792_br1450
  article-title: Reinforcement learning-assisted threshold optimization for dynamic honeypot adaptation to enhance iobt networks security
– year: 2017
  ident: 10.1016/j.cose.2024.103792_br0110
  article-title: Honeypot: a deceptive trap
  publication-title: Int. J. Eng. Technol. Manag. Appl. Sci.
– year: 2017
  ident: 10.1016/j.cose.2024.103792_br1030
– year: 2020
  ident: 10.1016/j.cose.2024.103792_br1180
– start-page: 1
  year: 2017
  ident: 10.1016/j.cose.2024.103792_br0900
  article-title: A novel sdn based stealthy tcp connection handover mechanism for hybrid honeypot systems
– start-page: 269
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br1960
  article-title: Sdn-based cyber deception deployment for proactive defense strategy using honey of things and cyber threat intelligence
– year: 2019
  ident: 10.1016/j.cose.2024.103792_br0640
  article-title: Forge: a fake online repository generation engine for cyber deception
  publication-title: IEEE Trans. Dependable Secure Comput.
– start-page: 18
  year: 2016
  ident: 10.1016/j.cose.2024.103792_br1400
  article-title: Deception-based game theoretical approach to mitigate dos attacks
– volume: 111
  start-page: 14106
  issue: 39
  year: 2014
  ident: 10.1016/j.cose.2024.103792_br1080
  article-title: Bioreplicated visual features of nanofabricated buprestid beetle decoys evoke stereotypical male mating flights
  publication-title: Proc. Natl. Acad. Sci.
  doi: 10.1073/pnas.1412810111
– start-page: 1
  year: 2017
  ident: 10.1016/j.cose.2024.103792_br0410
  article-title: Iotcandyjar: towards an intelligent-interaction honeypot for iot devices
  publication-title: Black Hat
– year: 2022
  ident: 10.1016/j.cose.2024.103792_br0020
– volume: 11
  start-page: 38
  issue: 1
  year: 2017
  ident: 10.1016/j.cose.2024.103792_br0400
  article-title: Versatile virtual honeynet management framework
  publication-title: IET Inf. Secur.
  doi: 10.1049/iet-ifs.2015.0256
– volume: 51
  start-page: 2623
  year: 2015
  ident: 10.1016/j.cose.2024.103792_br1210
  article-title: Resilient and trustworthy dynamic data-driven application systems (dddas) services for crisis management environments
  publication-title: Proc. Comput. Sci.
  doi: 10.1016/j.procs.2015.05.370
– start-page: 39
  year: 2020
  ident: 10.1016/j.cose.2024.103792_br0180
  article-title: A detailed analysis of intruders' activities in the network through the real-time virtual honeynet experimentation
– year: 2021
  ident: 10.1016/j.cose.2024.103792_br1500
– volume: 23
  start-page: 4060
  issue: 8
  year: 2023
  ident: 10.1016/j.cose.2024.103792_br2090
  article-title: Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure
  publication-title: Sensors
  doi: 10.3390/s23084060
– start-page: 123
  year: 2017
  ident: 10.1016/j.cose.2024.103792_br0690
  article-title: The dose makes the poison—leveraging uncertainty for effective malware detection
– volume: 141
  start-page: 32
  year: 2018
  ident: 10.1016/j.cose.2024.103792_br1550
  article-title: Multi-paradigm deception modeling for cyber defense
  publication-title: J. Syst. Softw.
  doi: 10.1016/j.jss.2018.03.031
– start-page: 1602
  year: 2019
  ident: 10.1016/j.cose.2024.103792_br0890
  article-title: Sdn-based hybrid honeypot for attack capture
– year: 2013
  ident: 10.1016/j.cose.2024.103792_br1070
SSID ssj0017688
Score 2.5200858
SecondaryResourceType review_article
Snippet Honeypot technologies are becoming increasingly popular in cybersecurity as they offer valuable insights into adversary behavior with a low rate of false...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 103792
SubjectTerms Cyber deception
Cybersecurity
Honeynet efficiency
Honeypot performance
Professional adversaries
Title A comprehensive survey on cyber deception techniques to improve honeypot performance
URI https://dx.doi.org/10.1016/j.cose.2024.103792
Volume 140
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF5KvXjxLdZH2YM3id1sdvM4lmKpir3YQm9hn7QiaWhToRd_u7vJJipIDx4TZkj4MpnH8s0MALcYBZIyjj3JlTQFSiS92AR6L2E8CoQQccLt0cDLOBxNydOMzlpgUPfCWFql8_2VTy-9tbvTc2j28sWi91oS6I0BWhakqcutHyYkslZ-_9nQPHyTTsfNfG8j7RpnKo6X5YSbGhGTsvc8wX8Hpx8BZ3gEDlymCPvVyxyDlspOwGG9hQG6n_IUTPrQ8sJXal5x0eF6s_pQW7jMoNhyIymVo67AZmDrGhZLuCjPExScLzO1zZcFzL-bCM7AdPgwGYw8tyvBEwEhhac5ob6gJGQxojoIJEGCqTBEmjPMOaM85hHndryfRomkSPtESYQFYoFSmATnoJ2Zx10AaFI2JiKSSJN3E0VYEvs0TigyX1SHWuMO8GuQUuEGidt9Fu9pzRh7Sy2wqQU2rYDtgLtGJ6_GaOyUpjX26S9jSI2f36F3-U-9K7Bvryoe4zVoF6uNujG5RsG7pTF1wV7_8Xk0_gKwwNSv
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Ja4NAFB5Ccmgv3UvTdQ69FcmoMy7HEBpMs1yaQG4ymySlqCSmkH_fGR1tC6WHXnUeyufzLTPfew-ARwe5glDmWIJJoRIUX1iBcvRWSJnvcs6DkOmtgenMixb4ZUmWLTCoa2E0rdLY_sqml9baXOkZNHv5et17LQn0SgE1C1Ll5coOd3R3KtIGnf5oHM2awwQVUQdNi28lYGpnKpqXpoWrNNHBZfl56Pzun775nOEJODLBIuxX73MKWjI9A8f1IAZo_stzMO9DTQ3fyFVFR4fb3eZD7mGWQr5naqWQhr0Cm56tW1hkcF1uKUi4ylK5z7MC5l91BBdgMXyeDyLLjEuwuItxYSUME5sT7NEAkcR1BUacSs9DCaMOY5SwgPmM6Q5_CQoFQYmNpUAOR9SV0sHuJWin6nFXAKqojXIfh0KF3lhiGgY2CUKC1EdNvCRxusCuQYq56SWuR1q8xzVp7C3WwMYa2LgCtgueGpm86qTx52pSYx__0IdYmfo_5K7_KfcADqL5dBJPRrPxDTjUdypa4y1oF5udvFOhR8HujWp9Ageu12A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+comprehensive+survey+on+cyber+deception+techniques+to+improve+honeypot+performance&rft.jtitle=Computers+%26+security&rft.au=Javadpour%2C+Amir&rft.au=Ja%27fari%2C+Forough&rft.au=Taleb%2C+Tarik&rft.au=Shojafar%2C+Mohammad&rft.date=2024-05-01&rft.pub=Elsevier+Ltd&rft.issn=0167-4048&rft.eissn=1872-6208&rft.volume=140&rft_id=info:doi/10.1016%2Fj.cose.2024.103792&rft.externalDocID=S0167404824000932
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon