{"id":"https://openalex.org/W4297099517","doi":"https://doi.org/10.1109/dsc54232.2022.9888911","title":"Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization","display_name":"Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization","publication_year":2022,"publication_date":"2022-06-22","ids":{"openalex":"https://openalex.org/W4297099517","doi":"https://doi.org/10.1109/dsc54232.2022.9888911"},"language":"en","primary_location":{"id":"doi:10.1109/dsc54232.2022.9888911","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc54232.2022.9888911","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044241907","display_name":"Warren Z. Cabral","orcid":"https://orcid.org/0000-0002-5270-0020"},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Warren Z. Cabral","raw_affiliation_strings":["Cyber Security Cooperative Research Centre, Edith Cowan University,Perth,Australia","Cyber Security Cooperative Research Centre, Edith Cowan University, Perth, Australia"],"affiliations":[{"raw_affiliation_string":"Cyber Security Cooperative Research Centre, Edith Cowan University,Perth,Australia","institution_ids":["https://openalex.org/I12079687"]},{"raw_affiliation_string":"Cyber Security Cooperative Research Centre, Edith Cowan University, Perth, Australia","institution_ids":["https://openalex.org/I12079687"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022617601","display_name":"Leslie F. Sikos","orcid":"https://orcid.org/0000-0003-3368-2215"},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Leslie F. Sikos","raw_affiliation_strings":["Edith Cowan University Perth,Australia","Edith Cowan University Perth, Australia"],"affiliations":[{"raw_affiliation_string":"Edith Cowan University Perth,Australia","institution_ids":["https://openalex.org/I12079687"]},{"raw_affiliation_string":"Edith Cowan University Perth, Australia","institution_ids":["https://openalex.org/I12079687"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038343278","display_name":"Craig Valli","orcid":"https://orcid.org/0000-0002-2298-9791"},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Craig Valli","raw_affiliation_strings":["Cyber Security Cooperative Research Centre, Edith Cowan University,Perth,Australia","Cyber Security Cooperative Research Centre, Edith Cowan University, Perth, Australia"],"affiliations":[{"raw_affiliation_string":"Cyber Security Cooperative Research Centre, Edith Cowan University,Perth,Australia","institution_ids":["https://openalex.org/I12079687"]},{"raw_affiliation_string":"Cyber Security Cooperative Research Centre, Edith Cowan University, Perth, Australia","institution_ids":["https://openalex.org/I12079687"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044241907"],"corresponding_institution_ids":["https://openalex.org/I12079687"],"apc_list":null,"apc_paid":null,"fwci":0.2839,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57897399,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.980758547782898},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7646781802177429},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.7643557190895081},{"id":"https://openalex.org/keywords/personalization","display_name":"Personalization","score":0.5911197066307068},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49790239334106445},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.36608564853668213},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.33290356397628784},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22227632999420166}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.980758547782898},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7646781802177429},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.7643557190895081},{"id":"https://openalex.org/C183003079","wikidata":"https://www.wikidata.org/wiki/Q1000371","display_name":"Personalization","level":2,"score":0.5911197066307068},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49790239334106445},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.36608564853668213},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.33290356397628784},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22227632999420166}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsc54232.2022.9888911","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc54232.2022.9888911","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W313385724","https://openalex.org/W1522160383","https://openalex.org/W2505685969","https://openalex.org/W2552542906","https://openalex.org/W2735598097","https://openalex.org/W2959334032","https://openalex.org/W3013735105","https://openalex.org/W3018350789","https://openalex.org/W3019791958","https://openalex.org/W3174784095","https://openalex.org/W3177618460","https://openalex.org/W3210312031","https://openalex.org/W4254206661","https://openalex.org/W6765794635","https://openalex.org/W6803578060"],"related_works":["https://openalex.org/W178168142","https://openalex.org/W2108595774","https://openalex.org/W2254955413","https://openalex.org/W2182300180","https://openalex.org/W4316658914","https://openalex.org/W4297099517","https://openalex.org/W53205080","https://openalex.org/W4313640576","https://openalex.org/W4312121995","https://openalex.org/W2903750024"],"abstract_inverted_index":{"Conpot":[0,42],"is":[1,95,138],"a":[2,9,60,74],"low-interaction":[3],"SCADA":[4],"honeypot":[5],"system":[6],"that":[7,62],"mimics":[8],"Siemens":[10],"S7-200":[11],"proprietary":[12],"device":[13],"on":[14,37,134],"default":[15,91],"deployments.":[16],"Honeypots":[17],"operating":[18],"using":[19,28],"standard":[20],"configurations":[21,145],"can":[22,48,107,123],"be":[23,49,124],"easily":[24],"detected":[25],"by":[26],"adversaries":[27],"scanning":[29],"tools":[30],"such":[31],"as":[32],"Shodan.":[33],"This":[34],"study":[35],"focuses":[36],"the":[38,41,56,65,84,90,100,114,117],"capabilities":[39],"of":[40,77,116],"honeypot,":[43],"and":[44,79,92,120,130],"how":[45,121,135],"these":[46],"competences":[47],"used":[50,125],"to":[51,72,83,98,111,139,146],"lure":[52],"attackers.":[53],"In":[54],"addition,":[55],"presented":[57,82],"research":[58],"establishes":[59],"framework":[61],"enables":[63],"for":[64],"customized":[66],"configuration,":[67],"thereby":[68],"enhancing":[69],"its":[70],"functionality":[71],"achieve":[73],"high":[75],"degree":[76],"deceptiveness":[78],"realism":[80],"when":[81],"Shodan":[85],"scanners.":[86],"A":[87],"comparison":[88],"between":[89],"configured":[93],"deployments":[94],"further":[96],"conducted":[97],"prove":[99],"modified":[101],"deployments'":[102],"effectiveness.":[103],"The":[104],"resulting":[105],"annotations":[106],"assist":[108],"cybersecurity":[109,132],"personnel":[110],"better":[112],"acknowledge":[113],"effectiveness":[115],"honeypot's":[118],"artifacts":[119],"they":[122],"deceptively.":[126],"Lastly,":[127],"it":[128,137],"informs":[129],"educates":[131],"audiences":[133],"important":[136],"deploy":[140],"honeypots":[141],"with":[142],"advanced":[143],"deceptive":[144],"bait":[147],"cybercriminals.":[148]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
