{"id":"https://openalex.org/W2090453876","doi":"https://doi.org/10.1109/jsac.2014.2358838","title":"A Reconfigurable Platform and Programming Tools for High-Level Network Applications Demonstrated as a Hardware Honeypot","display_name":"A Reconfigurable Platform and Programming Tools for High-Level Network Applications Demonstrated as a Hardware Honeypot","publication_year":2014,"publication_date":"2014-09-18","ids":{"openalex":"https://openalex.org/W2090453876","doi":"https://doi.org/10.1109/jsac.2014.2358838","mag":"2090453876"},"language":"en","primary_location":{"id":"doi:10.1109/jsac.2014.2358838","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsac.2014.2358838","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035507496","display_name":"Sascha M\u00fchlbach","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]},{"id":"https://openalex.org/I4210135606","display_name":"National Research Center for Applied Cybersecurity ATHENE","ror":"https://ror.org/0378v2g76","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210135606"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sascha Muhlbach","raw_affiliation_strings":["Center for Advanced Security Research Darmstadt (CASED), Darmstadt, Germany","Center for Advanced Security Research Darmstadt (CASED), Darmstadt, Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"Center for Advanced Security Research Darmstadt (CASED), Darmstadt, Germany","institution_ids":["https://openalex.org/I4210135606"]},{"raw_affiliation_string":"Center for Advanced Security Research Darmstadt (CASED), Darmstadt, Germany#TAB#","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047000315","display_name":"Andreas Koch","orcid":"https://orcid.org/0000-0002-1164-3082"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Andreas Koch","raw_affiliation_strings":["Embedded Systems and Applications Group, Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","Embedded Syst. & Applic. Group, Tech. Univ. Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Embedded Systems and Applications Group, Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]},{"raw_affiliation_string":"Embedded Syst. & Applic. Group, Tech. Univ. Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035507496"],"corresponding_institution_ids":["https://openalex.org/I31512782","https://openalex.org/I4210135606"],"apc_list":null,"apc_paid":null,"fwci":0.6896,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.75635185,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"32","issue":"10","first_page":"1919","last_page":"1932"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8682998418807983},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.678400993347168},{"id":"https://openalex.org/keywords/packet-processing","display_name":"Packet processing","score":0.6224938035011292},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5453402996063232},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5429191589355469},{"id":"https://openalex.org/keywords/network-processor","display_name":"Network processor","score":0.5374323725700378},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4335312843322754},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.42789602279663086},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.41797149181365967},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.41344499588012695},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.4067874252796173},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3992232084274292},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1575412154197693}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8682998418807983},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.678400993347168},{"id":"https://openalex.org/C2779581428","wikidata":"https://www.wikidata.org/wiki/Q7122997","display_name":"Packet processing","level":3,"score":0.6224938035011292},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5453402996063232},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5429191589355469},{"id":"https://openalex.org/C74366991","wikidata":"https://www.wikidata.org/wiki/Q2755335","display_name":"Network processor","level":3,"score":0.5374323725700378},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4335312843322754},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.42789602279663086},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.41797149181365967},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.41344499588012695},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.4067874252796173},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3992232084274292},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1575412154197693}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jsac.2014.2358838","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsac.2014.2358838","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},{"id":"pmh:oai:tubiblio.ulb.tu-darmstadt.de:120577","is_oa":false,"landing_page_url":"https://ieeexplore.ieee.org/document/6902760","pdf_url":null,"source":{"id":"https://openalex.org/S4377196390","display_name":"TUbilio (Technical University of Darmstadt)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I31512782","host_organization_name":"Technische Universit\u00e4t Darmstadt","host_organization_lineage":["https://openalex.org/I31512782"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Artikel"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W50337729","https://openalex.org/W1488399430","https://openalex.org/W1514368868","https://openalex.org/W1573594453","https://openalex.org/W1574000561","https://openalex.org/W1579038225","https://openalex.org/W1674877186","https://openalex.org/W1873122431","https://openalex.org/W1891842933","https://openalex.org/W1965845819","https://openalex.org/W1970427821","https://openalex.org/W2000861995","https://openalex.org/W2025266337","https://openalex.org/W2026700311","https://openalex.org/W2031006315","https://openalex.org/W2031823351","https://openalex.org/W2034450232","https://openalex.org/W2050504694","https://openalex.org/W2067845746","https://openalex.org/W2072172623","https://openalex.org/W2078803272","https://openalex.org/W2086474073","https://openalex.org/W2095761111","https://openalex.org/W2099375606","https://openalex.org/W2102484091","https://openalex.org/W2102596689","https://openalex.org/W2112891124","https://openalex.org/W2113454031","https://openalex.org/W2114709564","https://openalex.org/W2115477036","https://openalex.org/W2116666801","https://openalex.org/W2123630886","https://openalex.org/W2124632616","https://openalex.org/W2130182604","https://openalex.org/W2134319841","https://openalex.org/W2136519042","https://openalex.org/W2139245703","https://openalex.org/W2149252366","https://openalex.org/W2155310286","https://openalex.org/W2164253698","https://openalex.org/W2166431004","https://openalex.org/W2167735705","https://openalex.org/W2171286674","https://openalex.org/W2172168434","https://openalex.org/W2289378476","https://openalex.org/W3147807758","https://openalex.org/W6629164870","https://openalex.org/W6639366190"],"related_works":["https://openalex.org/W2060889682","https://openalex.org/W1606574587","https://openalex.org/W1556003661","https://openalex.org/W2097731574","https://openalex.org/W1233822343","https://openalex.org/W2097595905","https://openalex.org/W4235315652","https://openalex.org/W1993620881","https://openalex.org/W2390663577","https://openalex.org/W4243019710"],"abstract_inverted_index":{"The":[0],"security":[1,32],"of":[2,14,28,60,96,135,163],"computer":[3],"systems":[4],"and":[5,18,47,71,153],"networks":[6],"is":[7],"severely":[8],"threatened":[9],"today":[10],"by":[11],"the":[12,26,87,94,101,126,133,147,154,161,170],"combination":[13],"novel":[15],"attack":[16],"patterns":[17],"high":[19],"traffic":[20],"volumes.":[21],"Together,":[22],"this":[23,97,143],"often":[24],"exceeds":[25],"capabilities":[27],"purely":[29],"software-based":[30],"network":[31,110],"systems.":[33],"As":[34,128],"an":[35],"alternative,":[36],"hardware":[37],"acceleration":[38],"has":[39,79],"been":[40,66,82],"employed,":[41],"e.g.,":[42],"for":[43,107],"performing":[44],"deep-packet":[45],"inspection":[46],"pattern":[48],"matching":[49],"as":[50,52,112,114],"well":[51,113],"general":[53],"packet-header":[54],"processing.":[55],"While":[56],"such":[57],"implementations,":[58],"capable":[59],"handling":[61],"lower":[62],"protocol":[63],"layers,":[64],"have":[65],"extensively":[67],"studied":[68],"in":[69],"research":[70],"industry,":[72],"their":[73],"extension":[74],"to":[75,123],"higher":[76],"communication":[77],"layers":[78],"only":[80],"rarely":[81],"addressed.":[83],"Such":[84],"capabilities,":[85],"including":[86],"application":[88],"level":[89],"(OSI":[90],"Layer":[91],"7),":[92],"are":[93],"focus":[95],"work.":[98],"We":[99,158],"present":[100],"NetStage":[102,171],"platform,":[103],"employing":[104],"reconfigurable":[105],"computing":[106],"high-throughput":[108],"low-latency":[109],"processing,":[111],"associated":[115],"development":[116],"tools":[117],"that":[118],"allow":[119],"networking":[120],"domain":[121],"experts":[122],"easily":[124],"customize":[125],"system.":[127],"a":[129],"use-case,":[130],"we":[131,145],"consider":[132],"realization":[134],"high-performance":[136],"attack-resilient":[137],"honeypots":[138],"based":[139],"on":[140,169],"NetStage.":[141],"To":[142],"end,":[144],"introduce":[146],"Malacoda":[148],"language,":[149],"its":[150],"programming":[151],"tools,":[152],"generated":[155],"target":[156],"microarchitecture.":[157],"then":[159],"evaluate":[160],"performance":[162],"Malacoda-generated":[164],"vulnerability":[165],"emulation":[166],"handlers":[167],"running":[168],"platform.":[172]},"counts_by_year":[{"year":2017,"cited_by_count":2}],"updated_date":"2026-02-26T08:16:20.718346","created_date":"2025-10-10T00:00:00"}
