{"id":"https://openalex.org/W2773671833","doi":"https://doi.org/10.1145/3134600.3134614","title":"Picky Attackers","display_name":"Picky Attackers","publication_year":2017,"publication_date":"2017-12-04","ids":{"openalex":"https://openalex.org/W2773671833","doi":"https://doi.org/10.1145/3134600.3134614","mag":"2773671833"},"language":"en","primary_location":{"id":"doi:10.1145/3134600.3134614","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3134600.3134614","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027296718","display_name":"Timothy Barron","orcid":null},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Timothy Barron","raw_affiliation_strings":["Stony Brook University"],"affiliations":[{"raw_affiliation_string":"Stony Brook University","institution_ids":["https://openalex.org/I59553526"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014031812","display_name":"Nick Nikiforakis","orcid":"https://orcid.org/0000-0002-9366-357X"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nick Nikiforakis","raw_affiliation_strings":["Stony Brook University"],"affiliations":[{"raw_affiliation_string":"Stony Brook University","institution_ids":["https://openalex.org/I59553526"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027296718"],"corresponding_institution_ids":["https://openalex.org/I59553526"],"apc_list":null,"apc_paid":null,"fwci":2.2792,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.90212367,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"387","last_page":"398"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9957667589187622},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7363286018371582},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.706432580947876},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6988425254821777},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6411538124084473},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5527092218399048},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.4266775846481323}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9957667589187622},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7363286018371582},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.706432580947876},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6988425254821777},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6411538124084473},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5527092218399048},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.4266775846481323},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3134600.3134614","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3134600.3134614","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.75}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1517527854","https://openalex.org/W1522160383","https://openalex.org/W1531027799","https://openalex.org/W1536598138","https://openalex.org/W1573594453","https://openalex.org/W1665985821","https://openalex.org/W1996058992","https://openalex.org/W2016565838","https://openalex.org/W2045844007","https://openalex.org/W2049900312","https://openalex.org/W2102361025","https://openalex.org/W2103487196","https://openalex.org/W2141087303","https://openalex.org/W2147767253","https://openalex.org/W2148725298","https://openalex.org/W2294488712","https://openalex.org/W2399654538","https://openalex.org/W2405294821","https://openalex.org/W2550183133","https://openalex.org/W2635012095"],"related_works":["https://openalex.org/W2362574935","https://openalex.org/W1926248","https://openalex.org/W3118687971","https://openalex.org/W2363507101","https://openalex.org/W3159372857","https://openalex.org/W4320401378","https://openalex.org/W1517527854","https://openalex.org/W776729438","https://openalex.org/W2147767253","https://openalex.org/W1560502410"],"abstract_inverted_index":{"Honeypots":[0],"constitute":[1],"an":[2],"invaluable":[3],"piece":[4],"of":[5,17,38,47,66,73,96,100,117,130],"technology":[6],"that":[7,58],"allows":[8],"researchers":[9,41],"and":[10,22,29,49,98,124,126,163,177],"security":[11],"practitioners":[12],"to":[13,60,121],"track":[14],"the":[15,63,71,115,128,131,151,179],"evolution":[16],"break-in":[18],"techniques":[19],"by":[20,150],"attackers":[21,147],"discover":[23],"new":[24],"malicious":[25],"IP":[26],"addresses,":[27],"hosts,":[28],"victims.":[30],"Even":[31],"though":[32,140],"there":[33,54],"has":[34],"been":[35],"a":[36,45,67,81,92],"wealth":[37],"research":[39],"where":[40,89],"deploy":[42],"honeypots":[43,88,120,159],"for":[44,173,181],"period":[46],"time":[48],"report":[50,79],"on":[51,80,158,167],"their":[52],"findings,":[53,169],"is":[55],"little":[56],"work":[57],"attempts":[59],"understand":[61],"how":[62,103],"underlying":[64,152],"properties":[65],"compromised":[68],"system":[69],"affect":[70],"actions":[72,129],"attackers.":[74,110,133],"In":[75],"this":[76],"paper,":[77],"we":[78,90,112,136,170],"four-month":[82],"long":[83],"study":[84],"involving":[85],"102":[86],"medium-interaction":[87],"vary":[91],"honeypot's":[93],"location,":[94],"difficulty":[95],"break-in,":[97],"population":[99],"files,":[101],"observing":[102],"these":[104],"differences":[105],"elicit":[106],"different":[107],"behaviors":[108],"from":[109],"Moreover,":[111],"purposefully":[113],"leak":[114],"credentials":[116],"dedicated,":[118],"hard-to-brute-force,":[119],"hacking":[122],"forums":[123],"paste-sites":[125],"monitor":[127],"incoming":[132],"Among":[134],"others,":[135],"find":[137],"that,":[138],"even":[139],"bots":[141],"perform":[142],"specific":[143],"environment-agnostic":[144],"actions,":[145],"human":[146],"are":[148],"affected":[149],"environment,":[153],"e.g.,":[154],"executing":[155],"more":[156],"commands":[157],"with":[160],"realistic":[161],"files":[162],"folder":[164],"structures.":[165],"Based":[166],"our":[168],"provide":[171],"guidance":[172],"future":[174],"honeypot":[175],"deployments":[176],"motivate":[178],"need":[180],"having":[182],"multiple":[183],"intrusion-detection":[184],"systems.":[185]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2017-12-22T00:00:00"}
