{"id":"https://openalex.org/W2794834625","doi":"https://doi.org/10.1109/ntms.2018.8328709","title":"On the Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework","display_name":"On the Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework","publication_year":2018,"publication_date":"2018-02-01","ids":{"openalex":"https://openalex.org/W2794834625","doi":"https://doi.org/10.1109/ntms.2018.8328709","mag":"2794834625"},"language":"en","primary_location":{"id":"doi:10.1109/ntms.2018.8328709","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ntms.2018.8328709","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078305527","display_name":"Daniel Fraunholz","orcid":"https://orcid.org/0000-0002-9201-261X"},"institutions":[{"id":"https://openalex.org/I33256026","display_name":"German Research Centre for Artificial Intelligence","ror":"https://ror.org/01ayc5b57","country_code":"DE","type":"funder","lineage":["https://openalex.org/I33256026"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Daniel Fraunholz","raw_affiliation_strings":["Intelligent Networks Research Group, German Research Center for Artificial Intelligence, Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence, Kaiserslautern, Germany","institution_ids":["https://openalex.org/I33256026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025664186","display_name":"Daniel Krohmer","orcid":null},"institutions":[{"id":"https://openalex.org/I33256026","display_name":"German Research Centre for Artificial Intelligence","ror":"https://ror.org/01ayc5b57","country_code":"DE","type":"funder","lineage":["https://openalex.org/I33256026"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Daniel Krohmer","raw_affiliation_strings":["Intelligent Networks Research Group, German Research Center for Artificial Intelligence, Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence, Kaiserslautern, Germany","institution_ids":["https://openalex.org/I33256026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060209639","display_name":"Frederic Pohl","orcid":null},"institutions":[{"id":"https://openalex.org/I33256026","display_name":"German Research Centre for Artificial Intelligence","ror":"https://ror.org/01ayc5b57","country_code":"DE","type":"funder","lineage":["https://openalex.org/I33256026"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Frederic Pohl","raw_affiliation_strings":["Intelligent Networks Research Group, German Research Center for Artificial Intelligence, Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence, Kaiserslautern, Germany","institution_ids":["https://openalex.org/I33256026"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008473850","display_name":"Hans D. Schotten","orcid":"https://orcid.org/0000-0001-5005-3635"},"institutions":[{"id":"https://openalex.org/I33256026","display_name":"German Research Centre for Artificial Intelligence","ror":"https://ror.org/01ayc5b57","country_code":"DE","type":"funder","lineage":["https://openalex.org/I33256026"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Hans Dieter Schotten","raw_affiliation_strings":["Intell. Networks Res. Group, German Res. Center for Artificial Intell., Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"Intell. Networks Res. Group, German Res. Center for Artificial Intell., Kaiserslautern, Germany","institution_ids":["https://openalex.org/I33256026"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078305527"],"corresponding_institution_ids":["https://openalex.org/I33256026"],"apc_list":null,"apc_paid":null,"fwci":1.4763,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.83812353,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.719843327999115},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6831024885177612},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.6098804473876953},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.5913416147232056},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5868463516235352},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5604485869407654},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5020418167114258},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4525437355041504},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.42092615365982056},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4187219738960266},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.41748669743537903},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18366479873657227}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.719843327999115},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6831024885177612},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.6098804473876953},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.5913416147232056},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5868463516235352},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5604485869407654},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5020418167114258},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4525437355041504},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.42092615365982056},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4187219738960266},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.41748669743537903},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18366479873657227},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ntms.2018.8328709","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ntms.2018.8328709","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W224209684","https://openalex.org/W1542744732","https://openalex.org/W2032382690","https://openalex.org/W2077803661","https://openalex.org/W2093397575","https://openalex.org/W2117573971","https://openalex.org/W2129799385","https://openalex.org/W2132507345","https://openalex.org/W2161125296","https://openalex.org/W2161482094","https://openalex.org/W2479612266","https://openalex.org/W2513057535","https://openalex.org/W2599320555","https://openalex.org/W2605224218","https://openalex.org/W2608533973","https://openalex.org/W2621513089","https://openalex.org/W2766365590","https://openalex.org/W2768981064","https://openalex.org/W2769267310","https://openalex.org/W2775236000","https://openalex.org/W2809494870","https://openalex.org/W2962858319","https://openalex.org/W4299801659","https://openalex.org/W6608843575","https://openalex.org/W6677630654","https://openalex.org/W6683852856","https://openalex.org/W6685510272","https://openalex.org/W6719325137","https://openalex.org/W6752587436"],"related_works":["https://openalex.org/W2165717120","https://openalex.org/W2039390456","https://openalex.org/W2948663225","https://openalex.org/W2029954793","https://openalex.org/W1992683634","https://openalex.org/W4295295666","https://openalex.org/W1997179160","https://openalex.org/W3014916130","https://openalex.org/W2392897293","https://openalex.org/W2946162884"],"abstract_inverted_index":{"Information":[0],"security":[1,7,22],"is":[2,52,66],"a":[3,30,50,61,78],"fast-changing":[4],"domain.":[5],"Traditional":[6],"mechanisms":[8],"such":[9],"as":[10],"firewalls":[11],"and":[12,43,57,69,87],"access":[13],"control":[14],"are":[15,29],"circumvented":[16],"regularly.":[17],"The":[18,64,74],"amount":[19],"of":[20,85],"significant":[21],"incidents":[23],"grows":[24],"each":[25],"year.":[26],"Deception":[27],"systems":[28],"perfect":[31],"match":[32],"to":[33],"support":[34],"perimeter-based":[35],"technologies":[36],"in":[37,71],"intrusion":[38],"detection,":[39],"data":[40,44],"breach":[41],"identification":[42],"leakage":[45],"prevention.":[46],"In":[47],"this":[48],"work,":[49],"framework":[51,65],"proposed":[53],"generating,":[54],"deploying,":[55],"monitoring":[56],"maintaining":[58],"honeytokens":[59],"on":[60],"host":[62],"system.":[63],"easily":[67],"extendable":[68],"flexible":[70],"its":[72],"use.":[73],"authors":[75],"also":[76],"describe":[77],"prototype":[79],"implementation":[80],"for":[81],"four":[82],"different":[83],"types":[84],"tokens":[86],"thereby":[88],"address":[89],"typical":[90],"issues":[91],"when":[92],"operating":[93],"honeytokens.":[94]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2018,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
