{"id":"https://openalex.org/W4317928141","doi":"https://doi.org/10.1109/milcom55135.2022.10017548","title":"Locally-Hosted Fidelity-Adaptive Honeypots with Connection-Preserving Capabilities","display_name":"Locally-Hosted Fidelity-Adaptive Honeypots with Connection-Preserving Capabilities","publication_year":2022,"publication_date":"2022-11-28","ids":{"openalex":"https://openalex.org/W4317928141","doi":"https://doi.org/10.1109/milcom55135.2022.10017548"},"language":"en","primary_location":{"id":"doi:10.1109/milcom55135.2022.10017548","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/milcom55135.2022.10017548","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029731437","display_name":"Jaime C. Acosta","orcid":"https://orcid.org/0000-0003-2555-9989"},"institutions":[{"id":"https://openalex.org/I2802705668","display_name":"United States Army Combat Capabilities Development Command","ror":"https://ror.org/02rdkx920","country_code":"US","type":"other","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]},{"id":"https://openalex.org/I4210088792","display_name":"United States Army","ror":"https://ror.org/00afsp483","country_code":"US","type":"funder","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jaime C. Acosta","raw_affiliation_strings":["DEVCOM Army Research Laboratory,El Paso,TX,USA","DEVCOM Army Research Laboratory, El Paso, TX, USA"],"affiliations":[{"raw_affiliation_string":"DEVCOM Army Research Laboratory,El Paso,TX,USA","institution_ids":["https://openalex.org/I4210088792"]},{"raw_affiliation_string":"DEVCOM Army Research Laboratory, El Paso, TX, USA","institution_ids":["https://openalex.org/I2802705668"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5029731437"],"corresponding_institution_ids":["https://openalex.org/I2802705668","https://openalex.org/I4210088792"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22302558,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2008","issue":null,"first_page":"154","last_page":"159"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9778468608856201},{"id":"https://openalex.org/keywords/switchover","display_name":"Switchover","score":0.7469093799591064},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6948044300079346},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6349779963493347},{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.552779495716095},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.5469248294830322},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35106703639030457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3284856677055359},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3250611126422882},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2298555076122284},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14864057302474976}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9778468608856201},{"id":"https://openalex.org/C124200919","wikidata":"https://www.wikidata.org/wiki/Q2373346","display_name":"Switchover","level":2,"score":0.7469093799591064},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6948044300079346},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6349779963493347},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.552779495716095},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.5469248294830322},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35106703639030457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3284856677055359},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3250611126422882},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2298555076122284},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14864057302474976}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom55135.2022.10017548","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/milcom55135.2022.10017548","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1576185228","https://openalex.org/W2462670045","https://openalex.org/W2789663798","https://openalex.org/W2950558788","https://openalex.org/W3093855599","https://openalex.org/W3200473491","https://openalex.org/W4285128016","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W2789663798","https://openalex.org/W2375896275","https://openalex.org/W2385368614","https://openalex.org/W2166943775","https://openalex.org/W2158007046","https://openalex.org/W2775236000","https://openalex.org/W2071426633","https://openalex.org/W3212927647","https://openalex.org/W4286859165","https://openalex.org/W4317928141"],"abstract_inverted_index":{"The":[0,37,124],"attack":[1],"lifecycle":[2],"starts":[3],"with":[4,63,184],"the":[5,34,67,113,155,164,169],"intelligence":[6],"gathering":[7],"stage.":[8],"Network":[9],"scanning":[10,171],"tools":[11,25,47],"are":[12,76,108,162],"commonly":[13],"used":[14,28],"during":[15],"this":[16],"stage":[17],"to":[18,58,132],"enumerate":[19],"devices":[20,60],"and":[21,42,61,73,79,89,105,130,160,166],"their":[22,64,74,140],"services.":[23,65],"These":[24],"may":[26,48,55],"be":[27],"in":[29,96],"various":[30],"ways":[31],"depending":[32],"on":[33,82,120,148],"adversary's":[35],"motivations.":[36],"trade-off":[38],"is":[39,92,126,158],"between":[40],"stealth":[41],"potential":[43],"information":[44],"gain.":[45],"Some":[46],"simply":[49],"identify":[50],"live":[51],"hosts,":[52],"while":[53,137],"others":[54],"fully":[56],"connect":[57],"remote":[59],"interact":[62],"Traditionally,":[66],"choice":[68],"of":[69,85,128,146,168],"honeypot":[70,115,134],"deployment":[71],"locations":[72],"fidelity":[75],"mostly":[77],"static":[78],"they":[80],"rely":[81],"an":[83],"abundance":[84],"resources":[86],"for":[87],"hosting":[88],"redirection.":[90],"This":[91,110],"inefficient":[93],"and,":[94],"especially":[95],"resource-constrained":[97],"environments,":[98],"not":[99,180],"suitable.":[100],"Technologies":[101],"that":[102,118,154],"enable":[103],"efficient":[104],"adaptive":[106],"honeypots":[107],"critical.":[109],"paper":[111],"describes":[112],"multi-fidelity":[114],"system":[116,125],"(mfhoney)":[117],"runs":[119],"a":[121,149],"local":[122],"device.":[123],"capable":[127],"suspending":[129],"switching":[131],"different":[133],"processes,":[135],"on-the-fly,":[136],"carrying":[138],"over":[139],"active":[141],"network":[142],"connections.":[143],"An":[144],"evaluation":[145],"mfhoney":[147],"constrained":[150],"virtual":[151],"machine":[152],"indicates":[153],"switchover":[156],"behavior":[157,165],"seamless":[159],"delays":[161],"negligible:":[163],"reporting":[167],"Nmap":[170],"tool,":[172],"as":[173,175],"well":[174],"legitimate":[176],"client":[177],"applications,":[178],"does":[179],"change":[181],"when":[182],"interacting":[183],"mfhoney.":[185]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
