{"id":"https://openalex.org/W4386470388","doi":"https://doi.org/10.1109/lcn58197.2023.10223347","title":"A Ship Honeynet to Gather Cyber Threat Intelligence for the Maritime Sector","display_name":"A Ship Honeynet to Gather Cyber Threat Intelligence for the Maritime Sector","publication_year":2023,"publication_date":"2023-09-06","ids":{"openalex":"https://openalex.org/W4386470388","doi":"https://doi.org/10.1109/lcn58197.2023.10223347"},"language":"en","primary_location":{"id":"doi:10.1109/lcn58197.2023.10223347","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn58197.2023.10223347","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084154552","display_name":"Jeroen Pijpker","orcid":"https://orcid.org/0009-0008-8334-0655"},"institutions":[{"id":"https://openalex.org/I36523846","display_name":"Stenden University of Applied Sciences","ror":"https://ror.org/026xbkx09","country_code":"NL","type":"education","lineage":["https://openalex.org/I36523846"]},{"id":"https://openalex.org/I4387154156","display_name":"NHL Stenden University of Applied Sciences","ror":"https://ror.org/02xgxme97","country_code":null,"type":"education","lineage":["https://openalex.org/I4387154156"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Jeroen Pijpker","raw_affiliation_strings":["NHL Stenden University of Applied Sciences,Maritime IT Security Research Group,Emmen,Netherlands","Maritime IT Security Research Group, NHL Stenden University of Applied Sciences, Emmen, Netherlands"],"affiliations":[{"raw_affiliation_string":"NHL Stenden University of Applied Sciences,Maritime IT Security Research Group,Emmen,Netherlands","institution_ids":["https://openalex.org/I36523846"]},{"raw_affiliation_string":"Maritime IT Security Research Group, NHL Stenden University of Applied Sciences, Emmen, Netherlands","institution_ids":["https://openalex.org/I36523846","https://openalex.org/I4387154156"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021303636","display_name":"Stephen McCombie","orcid":"https://orcid.org/0000-0002-6511-9382"},"institutions":[{"id":"https://openalex.org/I4387154156","display_name":"NHL Stenden University of Applied Sciences","ror":"https://ror.org/02xgxme97","country_code":null,"type":"education","lineage":["https://openalex.org/I4387154156"]},{"id":"https://openalex.org/I36523846","display_name":"Stenden University of Applied Sciences","ror":"https://ror.org/026xbkx09","country_code":"NL","type":"education","lineage":["https://openalex.org/I36523846"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Stephen James McCombie","raw_affiliation_strings":["NHL Stenden University of Applied Sciences,Maritime IT Security Research Group,Leeuwarden,Netherlands","Maritime IT Security Research Group, NHL Stenden University of Applied Sciences, Leeuwarden, Netherlands"],"affiliations":[{"raw_affiliation_string":"NHL Stenden University of Applied Sciences,Maritime IT Security Research Group,Leeuwarden,Netherlands","institution_ids":["https://openalex.org/I36523846"]},{"raw_affiliation_string":"Maritime IT Security Research Group, NHL Stenden University of Applied Sciences, Leeuwarden, Netherlands","institution_ids":["https://openalex.org/I36523846","https://openalex.org/I4387154156"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5084154552"],"corresponding_institution_ids":["https://openalex.org/I36523846","https://openalex.org/I4387154156"],"apc_list":null,"apc_paid":null,"fwci":0.4018,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61369725,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9722506999969482},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7175187468528748},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5007038116455078},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42865562438964844},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.4239097833633423},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1348699927330017}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9722506999969482},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7175187468528748},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5007038116455078},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42865562438964844},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.4239097833633423},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1348699927330017}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn58197.2023.10223347","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn58197.2023.10223347","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1517527854","https://openalex.org/W1993091451","https://openalex.org/W2152378554","https://openalex.org/W2344898410","https://openalex.org/W2592042192","https://openalex.org/W2617416222","https://openalex.org/W2758108284","https://openalex.org/W2760313715","https://openalex.org/W2888802408","https://openalex.org/W2911396201","https://openalex.org/W2964522977","https://openalex.org/W2977901454","https://openalex.org/W3004403289","https://openalex.org/W3004774144","https://openalex.org/W3023436577","https://openalex.org/W3045239074","https://openalex.org/W3153622979","https://openalex.org/W3156178383","https://openalex.org/W3167846600","https://openalex.org/W3179462667","https://openalex.org/W3195892385","https://openalex.org/W3199997066","https://openalex.org/W6630924440","https://openalex.org/W6734100528","https://openalex.org/W6777243448"],"related_works":["https://openalex.org/W178168142","https://openalex.org/W4232715385","https://openalex.org/W2254955413","https://openalex.org/W2182300180","https://openalex.org/W4316658914","https://openalex.org/W2956011222","https://openalex.org/W2352475565","https://openalex.org/W2742579858","https://openalex.org/W4313484479","https://openalex.org/W4385187164"],"abstract_inverted_index":{"This":[0,108,130,243,269],"article":[1,109,244,270],"discusses":[2],"the":[3,13,23,31,42,53,58,62,69,72,93,106,111,146,164,190,247,277,281],"ongoing":[4,59],"design":[5,263],"and":[6,38,56,84,136,218,239,253,267,284,298],"development":[7],"of":[8,15,33,41,61,65,101,155,167,174,193,212,223,249],"a":[9,98,125,152,194,197,205,221,254,286],"ship":[10,80,195,210,255,282],"Honeynet":[11,126,198,256,283],"for":[12,151,163,182,280,301],"purpose":[14,166],"gathering":[16],"Cyber":[17],"Threat":[18],"Intelligence":[19],"(CTI)":[20],"to":[21,26,77,116,127,139,142,170,199],"assist":[22,219],"Maritime":[24,44],"Sector":[25],"be":[27,292],"more":[28,183],"resilient":[29],"in":[30,57,196,220,257,274,285],"face":[32],"increasing":[34],"cyber-attacks.":[35],"The":[36],"critical":[37],"fragile":[39],"nature":[40],"Global":[43],"Transportation":[45],"System":[46],"(GMTS)":[47],"has":[48],"been":[49],"clearly":[50],"shown":[51],"during":[52],"COVID-19":[54],"Pandemic":[55],"impact":[60],"Russian":[63],"invasion":[64],"Ukraine.":[66],"Unfortunately,":[67],"at":[68,92,276],"same":[70,94],"time":[71],"industry":[73],"is":[74,87,97,204],"highly":[75],"vulnerable":[76],"cyber-attack,":[78],"given":[79],"fleets":[81],"are":[82,159,176],"aging":[83,88],"their":[85],"technology":[86],"with":[89],"them":[90],"while":[91],"time,":[95],"there":[96],"low":[99],"level":[100],"cyber":[102,134],"security":[103,135],"maturity":[104],"within":[105],"industry.":[107],"describes":[110],"overall":[112],"research":[113,200],"project":[114,147],"aiming":[115],"gather":[117],"information":[118],"on":[119,122,202],"current":[120],"cyber-attacks":[121,201],"vessels":[123],"using":[124,294],"develop":[128],"CTI.":[129],"CTI":[131,302],"will":[132,148,245,271],"inform":[133],"maritime":[137,203],"professionals":[138],"better":[140],"respond":[141],"those":[143],"threats.":[144],"Additionally,":[145],"provide":[149],"data":[150,278],"broad":[153],"range":[154,222],"future":[156],"research.":[157],"Honeypots":[158,175],"Internet":[160],"systems":[161,192,215],"deployed":[162],"sole":[165],"being":[168],"compromised":[169],"observe":[171],"adversaries.":[172],"Networks":[173],"termed":[177],"Honeynets.":[178],"Honeypots/Honeynets":[179],"have":[180],"existed":[181],"than":[184],"30":[185],"years":[186],"however":[187],"simulating":[188],"all":[189],"different":[191],"novel":[206],"concept.":[207],"A":[208],"real":[209],"consists":[211],"multiple":[213],"digital":[214],"which":[216],"perform":[217],"necessary":[224],"functions":[225],"such":[226],"as":[227,259,261],"navigation,":[228],"communication,":[229],"safety,":[230],"propulsion,":[231],"cargo":[232],"management,":[233],"other":[234,241],"IT":[235],"standard":[236],"office":[237],"activities,":[238],"numerous":[240],"purposes.":[242,303],"explain":[246],"concept":[248,288],"Honeynets,":[250],"its":[251,262],"history,":[252],"particular,":[258],"well":[260],"considerations,":[264],"existing":[265],"models,":[266],"benefits.":[268],"also":[272],"look":[273],"detail":[275],"flows":[279],"new":[287],"how":[289],"it":[290],"can":[291],"integrated":[293],"MITRE":[295],"Corporation\u2019s":[296],"STIX":[297],"TAXII":[299],"methodologies":[300]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
