{"id":"https://openalex.org/W2940266355","doi":"https://doi.org/10.1109/iccnc.2019.8685566","title":"Probabilistic Estimation of Honeypot Detection in Internet of Things Environment","display_name":"Probabilistic Estimation of Honeypot Detection in Internet of Things Environment","publication_year":2019,"publication_date":"2019-02-01","ids":{"openalex":"https://openalex.org/W2940266355","doi":"https://doi.org/10.1109/iccnc.2019.8685566","mag":"2940266355"},"language":"en","primary_location":{"id":"doi:10.1109/iccnc.2019.8685566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccnc.2019.8685566","pdf_url":null,"source":{"id":"https://openalex.org/S4306498526","display_name":"2019 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004443200","display_name":"Oleg Surnin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210116741","display_name":"Innopolis University","ror":"https://ror.org/02b7jh107","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210116741"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Oleg Surnin","raw_affiliation_strings":["Institute of Information Systems, Innopolis University, Innopolis, Russia"],"affiliations":[{"raw_affiliation_string":"Institute of Information Systems, Innopolis University, Innopolis, Russia","institution_ids":["https://openalex.org/I4210116741"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044266495","display_name":"Fatima Hussain","orcid":"https://orcid.org/0000-0002-6306-9772"},"institutions":[{"id":"https://openalex.org/I530967","display_name":"Toronto Metropolitan University","ror":"https://ror.org/05g13zd79","country_code":"CA","type":"education","lineage":["https://openalex.org/I530967"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Fatima Hussain","raw_affiliation_strings":["Ryerson University, Canada"],"affiliations":[{"raw_affiliation_string":"Ryerson University, Canada","institution_ids":["https://openalex.org/I530967"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090705977","display_name":"Rasheed Hussain","orcid":"https://orcid.org/0000-0002-3771-7537"},"institutions":[{"id":"https://openalex.org/I4210116741","display_name":"Innopolis University","ror":"https://ror.org/02b7jh107","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210116741"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Rasheed Hussain","raw_affiliation_strings":["Institute of Information Systems, Innopolis University, Innopolis, Russia"],"affiliations":[{"raw_affiliation_string":"Institute of Information Systems, Innopolis University, Innopolis, Russia","institution_ids":["https://openalex.org/I4210116741"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027396560","display_name":"Svetlana Ostrovskaya","orcid":null},"institutions":[{"id":"https://openalex.org/I4210116741","display_name":"Innopolis University","ror":"https://ror.org/02b7jh107","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210116741"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Svetlana Ostrovskaya","raw_affiliation_strings":["Institute of Information Systems, Innopolis University, Innopolis, Russia"],"affiliations":[{"raw_affiliation_string":"Institute of Information Systems, Innopolis University, Innopolis, Russia","institution_ids":["https://openalex.org/I4210116741"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087099177","display_name":"A. V. Polovinkin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210116741","display_name":"Innopolis University","ror":"https://ror.org/02b7jh107","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210116741"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Andrey Polovinkin","raw_affiliation_strings":["Institute of Information Systems, Innopolis University, Innopolis, Russia"],"affiliations":[{"raw_affiliation_string":"Institute of Information Systems, Innopolis University, Innopolis, Russia","institution_ids":["https://openalex.org/I4210116741"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100401542","display_name":"Jooyoung Lee","orcid":"https://orcid.org/0000-0002-4635-247X"},"institutions":[{"id":"https://openalex.org/I4210116741","display_name":"Innopolis University","ror":"https://ror.org/02b7jh107","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210116741"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"JooYoung Lee","raw_affiliation_strings":["Institute of Information Systems, Innopolis University, Innopolis, Russia"],"affiliations":[{"raw_affiliation_string":"Institute of Information Systems, Innopolis University, Innopolis, Russia","institution_ids":["https://openalex.org/I4210116741"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022698330","display_name":"Xavier Fernando","orcid":"https://orcid.org/0000-0001-7120-528X"},"institutions":[{"id":"https://openalex.org/I530967","display_name":"Toronto Metropolitan University","ror":"https://ror.org/05g13zd79","country_code":"CA","type":"education","lineage":["https://openalex.org/I530967"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xavier Fernando","raw_affiliation_strings":["Ryerson University, Canada"],"affiliations":[{"raw_affiliation_string":"Ryerson University, Canada","institution_ids":["https://openalex.org/I530967"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5004443200"],"corresponding_institution_ids":["https://openalex.org/I4210116741"],"apc_list":null,"apc_paid":null,"fwci":3.9559,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.93982301,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"191","last_page":"196"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.971107542514801},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.78058260679245},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7227338552474976},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6744562387466431},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6382746696472168},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.621231734752655},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.500739336013794},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4488737881183624},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4164862632751465},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10702371597290039}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.971107542514801},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78058260679245},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7227338552474976},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6744562387466431},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6382746696472168},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.621231734752655},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.500739336013794},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4488737881183624},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4164862632751465},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10702371597290039}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/iccnc.2019.8685566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccnc.2019.8685566","pdf_url":null,"source":{"id":"https://openalex.org/S4306498526","display_name":"2019 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/4ffa6a9f-c44c-4e3d-9243-df342c0681dc","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/4ffa6a9f-c44c-4e3d-9243-df342c0681dc","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Surnin, O, Hussain, F, Hussain, R, Ostrovskaya, S, Polovinkin, A, Lee, J Y & Fernando, X 2019, Probabilistic Estimation of Honeypot Detection in Internet of Things Environment. in 2019 International Conference on Computing, Networking and Communications, ICNC 2019., 8685566, 2019 International Conference on Computing, Networking and Communications, ICNC 2019, Institute of Electrical and Electronics Engineers (IEEE), pp. 191-196. https://doi.org/10.1109/ICCNC.2019.8685566","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/4ffa6a9f-c44c-4e3d-9243-df342c0681dc","is_oa":false,"landing_page_url":"https://hdl.handle.net/1983/4ffa6a9f-c44c-4e3d-9243-df342c0681dc","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Surnin, O, Hussain, F, Hussain, R, Ostrovskaya, S, Polovinkin, A, Lee, J Y & Fernando, X 2019, Probabilistic Estimation of Honeypot Detection in Internet of Things Environment. in 2019 International Conference on Computing, Networking and Communications, ICNC 2019., 8685566, 2019 International Conference on Computing, Networking and Communications, ICNC 2019, Institute of Electrical and Electronics Engineers (IEEE), pp. 191-196. https://doi.org/10.1109/ICCNC.2019.8685566","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6200000047683716,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W48827708","https://openalex.org/W1675560586","https://openalex.org/W2038464478","https://openalex.org/W2099627340","https://openalex.org/W2292120555","https://openalex.org/W2597756285","https://openalex.org/W2607460355","https://openalex.org/W2622206102","https://openalex.org/W2738501932","https://openalex.org/W2782717270"],"related_works":["https://openalex.org/W2312996858","https://openalex.org/W2392120181","https://openalex.org/W2307276533","https://openalex.org/W2891168291","https://openalex.org/W2390124310","https://openalex.org/W2791075267","https://openalex.org/W2361650029","https://openalex.org/W2158220440","https://openalex.org/W1852121458","https://openalex.org/W2352199719"],"abstract_inverted_index":{"With":[0],"the":[1,4,10,24,31,34,87,102,117,129,136],"emergence":[2],"of":[3,6,13,26,33,45,70,131,172],"Internet":[5],"Things":[7],"(IoT)":[8],"and":[9,48,62,91,134,153,159,175],"increasing":[11],"number":[12,25],"resource-constrained":[14],"interconnected":[15],"smart":[16],"devices,":[17],"there":[18,51],"is":[19,52,81,105,141],"a":[20,53,82,94,108,124,132,166],"noticeable":[21],"increase":[22],"in":[23,65],"cyber":[27],"security":[28],"crimes.":[29],"In":[30,148],"face":[32],"possible":[35,155],"attacks":[36,64],"on":[37],"IoT":[38,66],"networks":[39],"such":[40],"as":[41,93,107],"network":[42,118],"intrusion,":[43],"denial":[44],"service,":[46],"spoofing":[47],"so":[49],"on,":[50],"need":[54],"to":[55,59,77,85,97,112,116,145],"develop":[56],"efficient":[57],"methods":[58],"locate":[60],"vulnerabilities":[61],"mitigate":[63],"networks.":[67],"Without":[68],"loss":[69],"generality,":[71],"we":[72,151,164],"consider":[73],"only":[74],"intrusion-related":[75],"threats":[76,90],"IoT.":[78],"A":[79],"honeypot":[80,133,161,173],"system":[83],"used":[84,106],"understand":[86],"potential":[88],"dynamic":[89],"act":[92],"proactive":[95],"measure":[96],"detect":[98,128],"any":[99],"intrusion":[100,137],"into":[101],"network.":[103],"It":[104],"trap":[109],"for":[110,143,157,169],"intruders":[111],"control":[113],"unauthorized":[114],"access":[115],"by":[119],"analyzing":[120],"malicious":[121],"traffic.":[122],"However,":[123],"sophisticated":[125],"attacker":[126],"can":[127],"presence":[130],"abort":[135],"mission.":[138],"Therefore":[139],"it":[140],"essential":[142],"honeypots":[144],"be":[146],"undetectable.":[147],"this":[149,180],"paper,":[150],"study":[152],"analyze":[154],"techniques":[156],"SSH":[158],"telnet":[160],"detection.":[162],"Moreover,":[163],"propose":[165],"new":[167],"methodology":[168],"probabilistic":[170],"estimation":[171],"detection":[174],"an":[176],"automated":[177],"software":[178],"implemented":[179],"methodology.":[181]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
