{"id":"https://openalex.org/W2896811869","doi":"https://doi.org/10.1145/3268966.3268971","title":"Ensuring Deception Consistency for FTP Services Hardened against Advanced Persistent Threats","display_name":"Ensuring Deception Consistency for FTP Services Hardened against Advanced Persistent Threats","publication_year":2018,"publication_date":"2018-01-15","ids":{"openalex":"https://openalex.org/W2896811869","doi":"https://doi.org/10.1145/3268966.3268971","mag":"2896811869"},"language":"en","primary_location":{"id":"doi:10.1145/3268966.3268971","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3268966.3268971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101561344","display_name":"Zhan Shu","orcid":"https://orcid.org/0000-0001-9600-9517"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhan Shu","raw_affiliation_strings":["Binghamton University, State University of New York, Binghamton, NY, USA"],"affiliations":[{"raw_affiliation_string":"Binghamton University, State University of New York, Binghamton, NY, USA","institution_ids":["https://openalex.org/I123946342"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029645292","display_name":"Guanhua Yan","orcid":"https://orcid.org/0000-0001-7482-4043"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guanhua Yan","raw_affiliation_strings":["Binghamton University, State University of New York, Binghamton, NY, USA"],"affiliations":[{"raw_affiliation_string":"Binghamton University, State University of New York, Binghamton, NY, USA","institution_ids":["https://openalex.org/I123946342"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101561344"],"corresponding_institution_ids":["https://openalex.org/I123946342"],"apc_list":null,"apc_paid":null,"fwci":0.9773,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.82222463,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"69","last_page":"79"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.9114798903465271},{"id":"https://openalex.org/keywords/file-transfer-protocol","display_name":"File Transfer Protocol","score":0.7859042882919312},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.721440851688385},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.6483619809150696},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6182653307914734},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.5611213445663452},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4861421287059784},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.47897791862487793},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.36862918734550476},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.18003851175308228},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13628554344177246},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1264982521533966},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.1023312509059906}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.9114798903465271},{"id":"https://openalex.org/C169485995","wikidata":"https://www.wikidata.org/wiki/Q42283","display_name":"File Transfer Protocol","level":3,"score":0.7859042882919312},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.721440851688385},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.6483619809150696},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6182653307914734},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.5611213445663452},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4861421287059784},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.47897791862487793},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.36862918734550476},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.18003851175308228},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13628554344177246},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1264982521533966},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.1023312509059906},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3268966.3268971","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3268966.3268971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7400000095367432}],"awards":[{"id":"https://openalex.org/G3007264278","display_name":null,"funder_award_id":"CNS-1618631","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W151695039","https://openalex.org/W769785222","https://openalex.org/W849628182","https://openalex.org/W1974898167","https://openalex.org/W2055961820","https://openalex.org/W2072610876","https://openalex.org/W2126058759","https://openalex.org/W2277813878","https://openalex.org/W2495047120","https://openalex.org/W2499232106","https://openalex.org/W2564321721","https://openalex.org/W2766667285","https://openalex.org/W2780895759","https://openalex.org/W6622429470"],"related_works":["https://openalex.org/W1563487782","https://openalex.org/W2502904752","https://openalex.org/W2982321743","https://openalex.org/W2796585648","https://openalex.org/W1976208064","https://openalex.org/W2095697673","https://openalex.org/W2046868646","https://openalex.org/W2242585576","https://openalex.org/W2006437542","https://openalex.org/W4255722964"],"abstract_inverted_index":{"As":[0],"evidenced":[1],"by":[2],"numerous":[3],"high-profile":[4],"security":[5,146],"incidents":[6],"such":[7],"as":[8],"the":[9,14,24,35,61,84,108,149,157,173],"Target":[10],"data":[11],"breach":[12],"and":[13],"Equifax":[15],"hack,":[16],"APTs":[17],"(Advanced":[18],"Persistent":[19],"Threats)":[20],"can":[21,66],"significantly":[22],"compromise":[23],"trustworthiness":[25],"of":[26,37,52,132,151,160,175],"cyber":[27,38],"space.":[28],"This":[29],"work":[30,54],"explores":[31],"how":[32],"to":[33,56,95,121,166],"improve":[34],"effectiveness":[36],"deception":[39,58,89,136],"in":[40,178],"hardening":[41],"FTP":[42,110,125],"(File":[43],"Transfer":[44],"Protocol)":[45],"services":[46],"against":[47],"APTs.":[48],"The":[49],"main":[50],"objective":[51],"our":[53],"is":[55,129],"ensure":[57],"consistency:":[59],"when":[60],"attackers":[62],"are":[63,71,164],"trapped,":[64],"they":[65,75,81],"only":[67],"make":[68],"observations":[69],"that":[70,80,128,156],"consistent":[72],"with":[73,138],"what":[74],"have":[76],"seen":[77],"already":[78],"so":[79],"cannot":[82],"recognize":[83],"deceptive":[85,162],"environment.":[86],"To":[87],"achieve":[88],"consistency,":[90],"we":[91,116,154],"use":[92,117],"logic":[93,119],"constraints":[94,120],"characterize":[96],"an":[97],"attacker's":[98,109],"best":[99],"knowledge":[100],"(either":[101],"positive,":[102],"negative,":[103],"or":[104],"uncertain).":[105],"When":[106],"migrating":[107],"connection":[111],"into":[112],"a":[113,123,144],"contained":[114],"environment,":[115],"these":[118],"instantiate":[122],"new":[124],"file":[126],"system":[127],"guaranteed":[130],"free":[131],"inconsistency.":[133],"We":[134],"performed":[135],"experiments":[137,170],"student":[139],"participants":[140],"who":[141],"just":[142],"completed":[143],"computer":[145],"course.":[147],"Following":[148],"design":[150],"Turing":[152],"tests,":[153],"find":[155],"participants'":[158],"chances":[159],"recognizing":[161],"environments":[163],"close":[165],"random":[167],"guesses.":[168],"Our":[169],"also":[171],"confirm":[172],"importance":[174],"observation":[176],"consistency":[177],"identifying":[179],"deception.":[180]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
