{"id":"https://openalex.org/W1559726850","doi":"https://doi.org/10.1007/978-3-642-21484-4_4","title":"Finding and Analyzing Evil Cities on the Internet","display_name":"Finding and Analyzing Evil Cities on the Internet","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W1559726850","doi":"https://doi.org/10.1007/978-3-642-21484-4_4","mag":"1559726850"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-21484-4_4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-21484-4_4","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ris.utwente.nl/ws/files/5297079/paper.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046153373","display_name":"Matthijs G. T. van Polen","orcid":null},"institutions":[{"id":"https://openalex.org/I88459447","display_name":"Novay","ror":"https://ror.org/00266dp40","country_code":"NL","type":"nonprofit","lineage":["https://openalex.org/I88459447"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Matthijs G. T. van Polen","raw_affiliation_strings":["Centre for Telematics and Information Technology (CTIT), Faculty of Electrical Engineering, Mathematics, and Computer Science (EEMCS), Design and Analysis of Communications Systems (DACS), Enschede, The Netherlands","Centre for Telematics and Information Technology, Faculty of Electrical Engineering, Mathematics and Computer Science, Design and Analysis of Communications Systems, Enschede, The Netherlands#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Telematics and Information Technology (CTIT), Faculty of Electrical Engineering, Mathematics, and Computer Science (EEMCS), Design and Analysis of Communications Systems (DACS), Enschede, The Netherlands","institution_ids":["https://openalex.org/I88459447"]},{"raw_affiliation_string":"Centre for Telematics and Information Technology, Faculty of Electrical Engineering, Mathematics and Computer Science, Design and Analysis of Communications Systems, Enschede, The Netherlands#TAB#","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041570123","display_name":"Giovane C. M. Moura","orcid":"https://orcid.org/0000-0002-6632-0221"},"institutions":[{"id":"https://openalex.org/I88459447","display_name":"Novay","ror":"https://ror.org/00266dp40","country_code":"NL","type":"nonprofit","lineage":["https://openalex.org/I88459447"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Giovane C. M. Moura","raw_affiliation_strings":["Centre for Telematics and Information Technology (CTIT), Faculty of Electrical Engineering, Mathematics, and Computer Science (EEMCS), Design and Analysis of Communications Systems (DACS), Enschede, The Netherlands","Centre for Telematics and Information Technology, Faculty of Electrical Engineering, Mathematics and Computer Science, Design and Analysis of Communications Systems, Enschede, The Netherlands#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Telematics and Information Technology (CTIT), Faculty of Electrical Engineering, Mathematics, and Computer Science (EEMCS), Design and Analysis of Communications Systems (DACS), Enschede, The Netherlands","institution_ids":["https://openalex.org/I88459447"]},{"raw_affiliation_string":"Centre for Telematics and Information Technology, Faculty of Electrical Engineering, Mathematics and Computer Science, Design and Analysis of Communications Systems, Enschede, The Netherlands#TAB#","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067140003","display_name":"Aiko Pras","orcid":"https://orcid.org/0000-0002-5091-8608"},"institutions":[{"id":"https://openalex.org/I88459447","display_name":"Novay","ror":"https://ror.org/00266dp40","country_code":"NL","type":"nonprofit","lineage":["https://openalex.org/I88459447"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Aiko Pras","raw_affiliation_strings":["Centre for Telematics and Information Technology (CTIT), Faculty of Electrical Engineering, Mathematics, and Computer Science (EEMCS), Design and Analysis of Communications Systems (DACS), Enschede, The Netherlands","Centre for Telematics and Information Technology, Faculty of Electrical Engineering, Mathematics and Computer Science, Design and Analysis of Communications Systems, Enschede, The Netherlands#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Telematics and Information Technology (CTIT), Faculty of Electrical Engineering, Mathematics, and Computer Science (EEMCS), Design and Analysis of Communications Systems (DACS), Enschede, The Netherlands","institution_ids":["https://openalex.org/I88459447"]},{"raw_affiliation_string":"Centre for Telematics and Information Technology, Faculty of Electrical Engineering, Mathematics and Computer Science, Design and Analysis of Communications Systems, Enschede, The Netherlands#TAB#","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046153373"],"corresponding_institution_ids":["https://openalex.org/I88459447"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.0146,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.87341374,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"38","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/geolocation","display_name":"Geolocation","score":0.9767158031463623},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.7705531120300293},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.7655074596405029},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7562566995620728},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5492220520973206},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4627329111099243},{"id":"https://openalex.org/keywords/ip-address","display_name":"Ip address","score":0.4605085253715515},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.35067370533943176},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1878032386302948}],"concepts":[{"id":"https://openalex.org/C22041718","wikidata":"https://www.wikidata.org/wiki/Q638949","display_name":"Geolocation","level":2,"score":0.9767158031463623},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.7705531120300293},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7655074596405029},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7562566995620728},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5492220520973206},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4627329111099243},{"id":"https://openalex.org/C2985371682","wikidata":"https://www.wikidata.org/wiki/Q11135","display_name":"Ip address","level":2,"score":0.4605085253715515},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.35067370533943176},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1878032386302948}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-642-21484-4_4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-21484-4_4","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ris.utwente.nl:publications/e04ba134-c866-43c6-a17f-12bde3f01f28","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/e04ba134-c866-43c6-a17f-12bde3f01f28","pdf_url":"https://ris.utwente.nl/ws/files/5297079/paper.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"van Polen, M G T, Moreira Moura, G & Pras, A 2011, Finding and Analyzing Evil Cities on the Internet. in I Chrisment, A Couch, R Badonnel & M Waldburger (eds), Proceedings of the 5th International Conference on Autonomous Infrastructure, Management and Security (AIMS). Lecture Notes in Computer Science, vol. 6734, Springer, Nancy, France, pp. 38-48, 5th International Conference on Autonomous Infrastructure, Management and Security 2011, Nancy, France, 13/06/11. https://doi.org/10.1007/978-3-642-21484-4_4","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:HAL:hal-01585870v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01585870","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.38-48, &#x27E8;10.1007/978-3-642-21484-4_4&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:ris.utwente.nl:publications/e04ba134-c866-43c6-a17f-12bde3f01f28","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/e04ba134-c866-43c6-a17f-12bde3f01f28","pdf_url":"https://ris.utwente.nl/ws/files/5297079/paper.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"van Polen, M G T, Moreira Moura, G & Pras, A 2011, Finding and Analyzing Evil Cities on the Internet. in I Chrisment, A Couch, R Badonnel & M Waldburger (eds), Proceedings of the 5th International Conference on Autonomous Infrastructure, Management and Security (AIMS). Lecture Notes in Computer Science, vol. 6734, Springer, Nancy, France, pp. 38-48, 5th International Conference on Autonomous Infrastructure, Management and Security 2011, Nancy, France, 13/06/11. https://doi.org/10.1007/978-3-642-21484-4_4","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1559726850.pdf","grobid_xml":"https://content.openalex.org/works/W1559726850.grobid-xml"},"referenced_works_count":7,"referenced_works":["https://openalex.org/W1572876171","https://openalex.org/W2036082278","https://openalex.org/W2101566660","https://openalex.org/W2133993681","https://openalex.org/W2138261645","https://openalex.org/W2142081864","https://openalex.org/W3217648367"],"related_works":["https://openalex.org/W2789663798","https://openalex.org/W2164525836","https://openalex.org/W2462403059","https://openalex.org/W2960036158","https://openalex.org/W2006986651","https://openalex.org/W3107950507","https://openalex.org/W1516981064","https://openalex.org/W1559726850","https://openalex.org/W2610746709","https://openalex.org/W4210547258"],"abstract_inverted_index":{"IP":[0,15],"Geolocation":[1],"is":[2,28,43,67],"used":[3,87],"to":[4,20,61,68,91],"determine":[5],"the":[6,24,62,70,75],"geographical":[7],"location":[8],"of":[9,23,39,112],"Internet":[10,76],"users":[11],"based":[12],"on":[13,74],"their":[14,93],"addresses.":[16],"When":[17],"it":[18,42],"comes":[19],"security,":[21],"most":[22,71],"traditional":[25],"geolocation":[26,59],"analysis":[27,60],"performed":[29],"at":[30],"country":[31],"level.":[32,64],"Since":[33],"countries":[34],"usually":[35],"have":[36,102],"many":[37],"cities/towns":[38],"different":[40],"sizes,":[41],"expected":[44],"that":[45],"they":[46,80],"behave":[47],"differently":[48],"when":[49],"performing":[50],"malicious":[51],"activities.":[52],"Therefore,":[53],"in":[54],"this":[55,99],"paper":[56],"we":[57,101],"refine":[58],"city":[63],"The":[65],"idea":[66],"find":[69],"dangerous":[72],"cities":[73],"and":[77,95,104,115],"observe":[78],"how":[79],"behave.":[81],"This":[82],"information":[83],"can":[84],"then":[85],"be":[86],"by":[88],"security":[89],"analysts":[90],"improve":[92],"methods":[94],"tools.":[96],"To":[97],"perform":[98],"analysis,":[100],"obtained":[103],"evaluated":[105],"data":[106],"from":[107,116],"a":[108],"real-world":[109],"honeypot":[110],"network":[111],"125":[113],"hosts":[114],"production":[117],"e-mail":[118],"servers.":[119]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2025-10-10T00:00:00"}
