{"id":"https://openalex.org/W2057933324","doi":"https://doi.org/10.1109/tii.2014.2304633","title":"Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks","display_name":"Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks","publication_year":2014,"publication_date":"2014-02-27","ids":{"openalex":"https://openalex.org/W2057933324","doi":"https://doi.org/10.1109/tii.2014.2304633","mag":"2057933324"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2014.2304633","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2014.2304633","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://www.osti.gov/biblio/1136315","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043432266","display_name":"Todd Vollmer","orcid":"https://orcid.org/0000-0003-1035-8789"},"institutions":[{"id":"https://openalex.org/I2800102766","display_name":"Idaho National Laboratory","ror":"https://ror.org/00ty2a548","country_code":"US","type":"facility","lineage":["https://openalex.org/I1325736334","https://openalex.org/I1330989302","https://openalex.org/I2800102766","https://openalex.org/I2801818860"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Todd Vollmer","raw_affiliation_strings":["Idaho National Laboratory, Idaho Falls, ID, USA","Idaho Nat. Lab., Idaho Falls, ID, USA"],"affiliations":[{"raw_affiliation_string":"Idaho National Laboratory, Idaho Falls, ID, USA","institution_ids":["https://openalex.org/I2800102766"]},{"raw_affiliation_string":"Idaho Nat. Lab., Idaho Falls, ID, USA","institution_ids":["https://openalex.org/I2800102766"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032679061","display_name":"Milos Manic","orcid":"https://orcid.org/0000-0003-1484-7678"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Milos Manic","raw_affiliation_strings":["University of Idaho, Idaho Falls, ID, USA","Univ. of Idaho, Idaho Falls, ID, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Idaho, Idaho Falls, ID, USA","institution_ids":["https://openalex.org/I155093810"]},{"raw_affiliation_string":"Univ. of Idaho, Idaho Falls, ID, USA#TAB#","institution_ids":["https://openalex.org/I155093810"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5043432266"],"corresponding_institution_ids":["https://openalex.org/I2800102766"],"apc_list":null,"apc_paid":null,"fwci":7.2379,"has_fulltext":false,"cited_by_count":65,"citation_normalized_percentile":{"value":0.97258763,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"10","issue":"2","first_page":"1337","last_page":"1347"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.8232380747795105},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7705956101417542},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5905474424362183},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5268536806106567},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5191715955734253},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48370224237442017},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.47867685556411743},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.47670453786849976},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.42112284898757935},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3993631899356842},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38728946447372437},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3615923821926117},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.205040842294693},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.11374589800834656}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.8232380747795105},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7705956101417542},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5905474424362183},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5268536806106567},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5191715955734253},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48370224237442017},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.47867685556411743},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.47670453786849976},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.42112284898757935},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3993631899356842},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38728946447372437},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3615923821926117},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.205040842294693},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.11374589800834656},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tii.2014.2304633","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2014.2304633","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},{"id":"pmh:oai:osti.gov:1136315","is_oa":true,"landing_page_url":"https://www.osti.gov/biblio/1136315","pdf_url":null,"source":{"id":"https://openalex.org/S4306402487","display_name":"OSTI OAI (U.S. Department of Energy Office of Scientific and Technical Information)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I139351228","host_organization_name":"Office of Scientific and Technical Information","host_organization_lineage":["https://openalex.org/I139351228"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"pmh:oai:osti.gov:1136315","is_oa":true,"landing_page_url":"https://www.osti.gov/biblio/1136315","pdf_url":null,"source":{"id":"https://openalex.org/S4306402487","display_name":"OSTI OAI (U.S. Department of Energy Office of Scientific and Technical Information)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I139351228","host_organization_name":"Office of Scientific and Technical Information","host_organization_lineage":["https://openalex.org/I139351228"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.550000011920929,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W130289478","https://openalex.org/W1202984889","https://openalex.org/W1563814383","https://openalex.org/W1595692637","https://openalex.org/W1674877186","https://openalex.org/W1965902027","https://openalex.org/W1977891450","https://openalex.org/W1981382297","https://openalex.org/W1985987493","https://openalex.org/W2000052611","https://openalex.org/W2038464478","https://openalex.org/W2060631282","https://openalex.org/W2093910295","https://openalex.org/W2102164974","https://openalex.org/W2109989421","https://openalex.org/W2122217421","https://openalex.org/W2127546815","https://openalex.org/W2138312667","https://openalex.org/W2141050228","https://openalex.org/W2152106854","https://openalex.org/W2184954724","https://openalex.org/W2311192399","https://openalex.org/W2568576883","https://openalex.org/W3145108608","https://openalex.org/W4233692121","https://openalex.org/W4285719527","https://openalex.org/W6635472854","https://openalex.org/W6637096788"],"related_works":["https://openalex.org/W4389485405","https://openalex.org/W2796752342","https://openalex.org/W313385724","https://openalex.org/W1967903162","https://openalex.org/W2361650029","https://openalex.org/W2990025694","https://openalex.org/W4211206025","https://openalex.org/W3147872107","https://openalex.org/W1852121458","https://openalex.org/W2352199719"],"abstract_inverted_index":{"A":[0],"challenge":[1],"facing":[2],"industrial":[3],"control":[4,33,68],"network":[5,52,70,94,101,150,184],"administrators":[6],"is":[7],"protecting":[8],"the":[9,29,76,85,111,190,200],"typically":[10],"large":[11],"number":[12],"of":[13,93,134,153,189,199],"connected":[14],"assets":[15],"for":[16,48,62,91,117,129,187],"which":[17],"they":[18,32],"are":[19,45],"responsible.":[20],"These":[21],"cyber":[22],"devices":[23],"may":[24],"be":[25],"tightly":[26],"coupled":[27],"with":[28,166,181],"physical":[30],"processes":[31],"and":[34,50,60,72,114,132,148],"human":[35],"induced":[36],"failures":[37],"risk":[38],"dire":[39],"real-world":[40],"consequences.":[41],"Dynamic":[42],"virtual":[43,160],"honeypots":[44,64],"effective":[46],"tools":[47,88,113],"observing":[49],"attracting":[51],"intruder":[53],"activity.":[54],"This":[55,138],"paper":[56],"presents":[57],"a":[58,123,135,154],"design":[59],"implementation":[61],"self-configuring":[63],"that":[65],"passively":[66],"examine":[67],"system":[69,171,195],"traffic":[71],"actively":[73],"adapt":[74],"to":[75,81],"observed":[77],"environment.":[78],"In":[79],"contrast":[80],"prior":[82],"work":[83],"in":[84,107,164,172],"field,":[86],"six":[87],"were":[89,162,178],"analyzed":[90],"suitability":[92],"entity":[95],"information":[96],"gathering.":[97],"Ettercap,":[98],"an":[99,143,167,173],"established":[100],"security":[102],"tool":[103],"not":[104],"commonly":[105],"used":[106],"this":[108],"capacity,":[109],"outperformed":[110],"other":[112],"was":[115,127,140],"chosen":[116],"implementation.":[118],"Utilizing":[119],"Ettercap":[120],"XML":[121],"output,":[122],"novel":[124],"four-step":[125],"algorithm":[126,139],"developed":[128],"autonomous":[130],"creation":[131],"update":[133],"Honeyd":[136],"configuration.":[137],"tested":[141],"on":[142,197],"existing":[144],"small":[145],"campus":[146],"grid":[147],"sensor":[149],"by":[151],"execution":[152],"collaborative":[155],"usage":[156],"scenario.":[157,175],"Automatically":[158],"created":[159],"hosts":[161,177],"deployed":[163],"concert":[165],"anomaly":[168],"behavior":[169],"(AB)":[170],"attack":[174],"Virtual":[176],"automatically":[179],"configured":[180],"unique":[182],"emulated":[183,202],"stack":[185],"behaviors":[186],"92%":[188],"targeted":[191],"devices.":[192,203],"The":[193],"AB":[194],"alerted":[196],"100%":[198],"monitored":[201]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
