{"id":"https://openalex.org/W2794476063","doi":"https://doi.org/10.1109/msp.2018.1870870","title":"Effects of a Honeypot on the Cyber Grand Challenge Final Event","display_name":"Effects of a Honeypot on the Cyber Grand Challenge Final Event","publication_year":2018,"publication_date":"2018-03-01","ids":{"openalex":"https://openalex.org/W2794476063","doi":"https://doi.org/10.1109/msp.2018.1870870","mag":"2794476063"},"language":"en","primary_location":{"id":"doi:10.1109/msp.2018.1870870","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msp.2018.1870870","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089768702","display_name":"Michael Thompson","orcid":"https://orcid.org/0000-0002-0836-244X"},"institutions":[{"id":"https://openalex.org/I35364215","display_name":"Naval Postgraduate School","ror":"https://ror.org/033yfkj90","country_code":"US","type":"education","lineage":["https://openalex.org/I1330347796","https://openalex.org/I3130687028","https://openalex.org/I35364215"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael F. Thompson","raw_affiliation_strings":["Naval Postgraduate School"],"affiliations":[{"raw_affiliation_string":"Naval Postgraduate School","institution_ids":["https://openalex.org/I35364215"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5089768702"],"corresponding_institution_ids":["https://openalex.org/I35364215"],"apc_list":null,"apc_paid":null,"fwci":0.1658,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.41665041,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"16","issue":"2","first_page":"37","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9710999727249146,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9324266910552979},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.6324169635772705},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6176804304122925},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.5997527837753296},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5978039503097534},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.49687984585762024},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.47084757685661316},{"id":"https://openalex.org/keywords/competitor-analysis","display_name":"Competitor analysis","score":0.43998536467552185},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.16042858362197876},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.0941832959651947},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08982840180397034}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9324266910552979},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.6324169635772705},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6176804304122925},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5997527837753296},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5978039503097534},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.49687984585762024},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.47084757685661316},{"id":"https://openalex.org/C127576917","wikidata":"https://www.wikidata.org/wiki/Q624630","display_name":"Competitor analysis","level":2,"score":0.43998536467552185},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.16042858362197876},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0941832959651947},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08982840180397034},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/msp.2018.1870870","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msp.2018.1870870","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},{"id":"pmh:oai:calhoun.nps.edu:10945/59134","is_oa":false,"landing_page_url":"http://hdl.handle.net/10945/59134","pdf_url":null,"source":{"id":"https://openalex.org/S4306400952","display_name":"Calhoun: The Naval Postgraduate School Institutional Archive (Naval Postgraduate School)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I35364215","host_organization_name":"Naval Postgraduate School","host_organization_lineage":["https://openalex.org/I35364215"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2789663798","https://openalex.org/W2375896275","https://openalex.org/W2166943775","https://openalex.org/W1903420481","https://openalex.org/W2158007046","https://openalex.org/W2775236000","https://openalex.org/W2071426633","https://openalex.org/W2349754162","https://openalex.org/W4253323281","https://openalex.org/W2355641539"],"abstract_inverted_index":{"Throughout":[0],"much":[1],"of":[2,20,27,57,83,127,131],"the":[3,18,40,58,67,89,94,106,116,125,128,132],"Cyber":[4],"Grand":[5],"Challenge":[6],"(CGC)":[7],"Final":[8],"Event":[9],"(CFE),":[10],"one":[11],"team":[12],"deliberately":[13],"included":[14],"a":[15,21,64,111],"honeypot":[16,107],"in":[17],"form":[19],"simple":[22],"buffer":[23],"overflow":[24],"within":[25,93],"most":[26],"their":[28],"\u201cpatched\u201d":[29],"services.":[30],"This":[31,74],"vulnerability":[32],"could":[33],"not":[34],"be":[35],"reached":[36],"while":[37],"executing":[38,48],"on":[39,49],"CGC":[41,59],"infrastructure":[42],"but":[43],"was":[44],"trivially":[45],"reachable":[46],"when":[47],"other":[50],"platforms,":[51],"for":[52,72],"example,":[53],"an":[54],"instrumented":[55],"instance":[56],"execution":[60,100],"environment":[61],"used":[62],"by":[63],"competitor":[65],"during":[66],"competition":[68],"to":[69,86,98,109,115,124],"analyze":[70],"software":[71],"vulnerabilities.":[73],"ruse":[75],"fooled":[76],"some":[77],"competitors":[78],"into":[79],"abandoning":[80],"working":[81],"proofs":[82],"vulnerabilities":[84],"(PoVs)":[85],"instead":[87],"attack":[88],"honeypot.":[90],"However,":[91],"logic":[92],"patched":[95],"service":[96,117],"designed":[97],"control":[99],"divergence":[101],"toward":[102],"or":[103],"away":[104],"from":[105],"appears":[108],"contain":[110],"flaw,":[112],"which":[113],"led":[114],"crashing.":[118],"These":[119],"crashes":[120],"occurred":[121],"many":[122],"times,":[123],"detriment":[126],"availability":[129],"score":[130],"honeypot\u2019s":[133],"author.":[134]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
