Fan, W., Du, Z., Smith-Creasey, M., and Fern
´
andez, D.
(2019). Honeydoc: An efficient honeypot architecture
enabling all-round design. IEEE Journal on Selected
Areas in Communications.
Karen A. Scarfone, Peter M. Mell (2007). Guide to Intru-
sion Detection and Prevention Systems (IDPS). Tech-
nical report, NIST.
Lewandowski, P., Janiszewski, M., and Felkner, A. (2020).
Spidertrap - an innovative approach to analyze activity
of internet bots on a website. IEEE Access.
Litchfield, S., Formby, D., Rogers, J., Meliopoulos, S., and
Beyah, R. (2016). Rethinking the honeypot for cyber-
physical systems. IEEE Internet Computing.
Mairh, A., Barik, D., Verma, K., and Jena, D. (2011). Hon-
eypot in network security: A survey. In Proceedings
of the 2011 International Conference on Communica-
tion, Computing & Security. ICCCS, ACM.
Malin, C. (2017). LureBox - Using Honeytokens for De-
tecting Cyberattacks. Master’s thesis, UAS St. P
¨
olten.
Mart
´
ınez Garre, J. T., Gil P
´
erez, M., and Ruiz-Mart
´
ınez, A.
(2020). A novel machine learning-based approach for
the detection of ssh botnet infection. Future Genera-
tion Computer Systems.
Mokube, I. and Adams, M. (2007). Honeypots: Concepts,
approaches, and challenges. In Proceedings of the
45th Annual Southeast Regional Conference. ACM-
SE.
Papp, D., Ma, Z., and Buttyan, L. (2015). Embedded sys-
tems security: Threats, vulnerabilities, and attack tax-
onomy. In 2015 13th Annual Conference on Privacy,
Security and Trust (PST).
Petruni
´
c, R. (2015). Honeytokens as active defense. In
2015 38th International Convention on Information
and Communication Technology, Electronics and Mi-
croelectronics (MIPRO). MIPRO.
Pouget, F., Dacier, M., and Debar, H. (2013). Honeypot,
Honeynet, Honeytoken: Terminological issues. Insti-
tut Eur
´
ecom (EURECOM), Sophia Antipolis, France,
Research Report RR-03-081.
Project, T. H. (2001). Know Your Enemy: Honeynets.
Project, T. H. (2002). Know Your Enemy: Defining Virtual
Honeynets.
Provos, N. (2003). HoneyD: A Virtual Honeypot Daemon.
Puri, R. (2003). Bots & botnet: An overview.
Qassrawi, M. T. and Hongli, Z. (2010). Deception method-
ology in virtual honeypots. In 2010 Second Inter-
national Conference on Networks Security, Wireless
Communications and Trusted Computing. NSWCTC.
Quynh, N. A. and Takefuji, Y. (2006). Towards an invisible
honeypot monitoring system. In Australasian Confer-
ence on Information Security and Privacy. ACISP.
Ren, J., Zhang, C., and Hao, Q. (2020). A theoretical
method to evaluate honeynet potency. Future Gen-
eration Computer Systems.
Sandescu, C., Rughinis, R., and Octavian, G. (2017). Hunt:
Using honeytokens to understand and influence the
execution of an attack. In Proceedings of the 13th
International Scientific Conference ”eLearning and
Software for Education”. eLSE.
Shi, L., Li, Y., Liu, T., Liu, J., Shan, B., and Chen,
H. (2019). Dynamic distributed honeypot based on
blockchain. IEEE Access.
Simmons, C., Ellis, C., Shiva, S., Dasgupta, D., and Wu, Q.
(2014). Avoidit: A cyber attack taxonomy. In 9th An-
nual Symposium on Information Assurance (ASIA’14).
ASIA.
Sokol, P., M
´
ı
ˇ
sek, J., and Hus
´
ak, M. (2017). Honeypots and
honeynets: issues of privacy. EURASIP Journal on
Information Security.
Spitzner, L. (2002). Honeypots: Tracking Hackers. Addison
Wesley.
Spitzner, L. (2003a). Honeypots: Catching the Insider
Threat. In 19th Annual Computer Security Applica-
tions Conference, 2003. Proceedings. IEEE.
Spitzner, L. (2003b). Honeytokens: The other honeypot. In
Endpoint Protection. Broadcom.
Vasilomanolakis, E., Karuppayah, S., M
¨
uhlh
¨
auser, M., and
Fischer, M. (2014). Hostage - a mobile honeypot for
collaborative defense. In Proceedings of the 7th Inter-
national Conference on Security of Information and
Networks. SIN.
Vasilomanolakis, E., Srinivasa, S., and M
¨
uhlh
¨
auser, M.
(2015). Did you really hack a nuclear power plant?
an industrial control mobile honeypot. In 2015 IEEE
Conference on Communications and Network Security
(CNS).
Wagner, T. D. (2019). Cyber threat intelligence for
“things”. In 2019 International Conference on Cy-
ber Situational Awareness, Data Analytics And As-
sessment (Cyber SA).
Wang, P., Wu, L., Cunningham, R., and Zou, C. C. (2010).
Honeypot detection in advanced botnet attacks. Int. J.
Inf. Comput. Secur.
Wang, Z., Li, G., Chi, Y., Zhang, J., Liu, Q., Yang, T., and
Zhou, W. (2019). Honeynet construction based on in-
trusion detection. In Proceedings of the 3rd Interna-
tional Conference on Computer Science and Applica-
tion Engineering, CSAE 2019. CSAE.
Zou, C. C. and Cunningham, R. (2006). Honeypot-aware
advanced botnet construction and maintenance. In In-
ternational Conference on Dependable Systems and
Networks (DSN’06). DSN.
ICEIS 2021 - 23rd International Conference on Enterprise Information Systems
188