{"id":"https://openalex.org/W4318604478","doi":"https://doi.org/10.1109/ssci51031.2022.10022206","title":"Increasing attacker engagement on SSH honeypots using semantic embeddings of cyber-attack patterns and deep reinforcement learning","display_name":"Increasing attacker engagement on SSH honeypots using semantic embeddings of cyber-attack patterns and deep reinforcement learning","publication_year":2022,"publication_date":"2022-12-04","ids":{"openalex":"https://openalex.org/W4318604478","doi":"https://doi.org/10.1109/ssci51031.2022.10022206"},"language":"en","primary_location":{"id":"doi:10.1109/ssci51031.2022.10022206","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssci51031.2022.10022206","pdf_url":null,"source":{"id":"https://openalex.org/S4363605327","display_name":"2022 IEEE Symposium Series on Computational Intelligence (SSCI)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium Series on Computational Intelligence (SSCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079151137","display_name":"Junior Samuel L\u00f3pez-Y\u00e9pez","orcid":"https://orcid.org/0000-0002-4619-8329"},"institutions":[{"id":"https://openalex.org/I4210095320","display_name":"Thales (Canada)","ror":"https://ror.org/00nnd3206","country_code":"CA","type":"company","lineage":["https://openalex.org/I4210095320","https://openalex.org/I4210140930"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Junior Samuel Lopez-Yepez","raw_affiliation_strings":["Thales Digital Solutions Thales Group,Montreal,Canada","Thales Digital Solutions Thales Group, Montreal, Canada"],"raw_orcid":"https://orcid.org/0000-0002-4619-8329","affiliations":[{"raw_affiliation_string":"Thales Digital Solutions Thales Group,Montreal,Canada","institution_ids":["https://openalex.org/I4210095320"]},{"raw_affiliation_string":"Thales Digital Solutions Thales Group, Montreal, Canada","institution_ids":["https://openalex.org/I4210095320"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070807669","display_name":"Antoine Fagette","orcid":null},"institutions":[{"id":"https://openalex.org/I4210095320","display_name":"Thales (Canada)","ror":"https://ror.org/00nnd3206","country_code":"CA","type":"company","lineage":["https://openalex.org/I4210095320","https://openalex.org/I4210140930"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Antoine Fagette","raw_affiliation_strings":["Thales Digital Solutions Thales Group,Montreal,Canada","Thales Digital Solutions Thales Group, Montreal, Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Thales Digital Solutions Thales Group,Montreal,Canada","institution_ids":["https://openalex.org/I4210095320"]},{"raw_affiliation_string":"Thales Digital Solutions Thales Group, Montreal, Canada","institution_ids":["https://openalex.org/I4210095320"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5079151137"],"corresponding_institution_ids":["https://openalex.org/I4210095320"],"apc_list":null,"apc_paid":null,"fwci":1.5012,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.83139696,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"389","last_page":"395"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9522376656532288},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8706438541412354},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7014025449752808},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5369000434875488},{"id":"https://openalex.org/keywords/reinforcement","display_name":"Reinforcement","score":0.5036942362785339},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4153302311897278},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38748955726623535},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11894115805625916}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9522376656532288},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8706438541412354},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7014025449752808},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5369000434875488},{"id":"https://openalex.org/C67203356","wikidata":"https://www.wikidata.org/wiki/Q1321905","display_name":"Reinforcement","level":2,"score":0.5036942362785339},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4153302311897278},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38748955726623535},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11894115805625916},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ssci51031.2022.10022206","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssci51031.2022.10022206","pdf_url":null,"source":{"id":"https://openalex.org/S4363605327","display_name":"2022 IEEE Symposium Series on Computational Intelligence (SSCI)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium Series on Computational Intelligence (SSCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.5699999928474426,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1599353299","https://openalex.org/W1614298861","https://openalex.org/W1980867644","https://openalex.org/W2082135129","https://openalex.org/W2103487196","https://openalex.org/W2112675663","https://openalex.org/W2126204609","https://openalex.org/W2140405352","https://openalex.org/W2145339207","https://openalex.org/W2201581102","https://openalex.org/W2250539671","https://openalex.org/W2294934636","https://openalex.org/W2724169821","https://openalex.org/W2799080304","https://openalex.org/W2886190986","https://openalex.org/W2909540406","https://openalex.org/W2980038013","https://openalex.org/W2980839873","https://openalex.org/W3003960714","https://openalex.org/W3018350789","https://openalex.org/W3022566517","https://openalex.org/W3134392604","https://openalex.org/W3137551205","https://openalex.org/W3202896057","https://openalex.org/W4214717370","https://openalex.org/W4298857966","https://openalex.org/W6636510571","https://openalex.org/W6637967152","https://openalex.org/W6685444567","https://openalex.org/W6687681856","https://openalex.org/W6740092555","https://openalex.org/W6776438516"],"related_works":["https://openalex.org/W178168142","https://openalex.org/W4232715385","https://openalex.org/W2254955413","https://openalex.org/W2182300180","https://openalex.org/W4316658914","https://openalex.org/W2956011222","https://openalex.org/W2352475565","https://openalex.org/W4313484479","https://openalex.org/W2742579858","https://openalex.org/W4385187164"],"abstract_inverted_index":{"In":[0,61],"this":[1],"article,":[2],"we":[3,63],"demonstrate":[4],"how":[5,65],"combining":[6],"semantic":[7],"embeddings":[8],"of":[9,21,30,68,81],"cyber-attack":[10],"patterns":[11],"and":[12,36],"deep":[13],"reinforcement":[14,58],"learning":[15,59],"(DRL)":[16],"can":[17],"increase":[18],"the":[19,66,79],"engagement":[20,51,80],"attackers":[22,83],"in":[23,84],"interactive":[24],"honeypots.":[25],"We":[26],"use":[27],"a":[28,85],"dataset":[29],"real-world":[31],"cyber-attacks":[32],"to":[33,53,73],"pre-train,":[34],"train":[35],"test":[37],"our":[38,44],"system.":[39],"Our":[40],"results":[41],"show":[42],"that":[43],"implementation":[45],"is":[46],"effective":[47],"at":[48],"increasing":[49],"attackers'":[50],"compared":[52],"non-interactive":[54],"honeypots":[55],"or":[56],"tabular":[57],"algorithms.":[60],"addition,":[62],"present":[64],"inclusion":[67],"pattern":[69],"data,":[70],"as":[71],"opposed":[72],"only":[74],"current":[75],"data":[76],"increases":[77],"significantly":[78],"artificial":[82],"simulated":[86],"environment.":[87]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
