{"id":"https://openalex.org/W4386823106","doi":"https://doi.org/10.1587/transfun.2023cip0018","title":"Observation of Human-Operated Accesses Using Remote Management Device Honeypot","display_name":"Observation of Human-Operated Accesses Using Remote Management Device Honeypot","publication_year":2023,"publication_date":"2023-09-18","ids":{"openalex":"https://openalex.org/W4386823106","doi":"https://doi.org/10.1587/transfun.2023cip0018"},"language":"en","primary_location":{"id":"doi:10.1587/transfun.2023cip0018","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1587/transfun.2023cip0018","pdf_url":"https://www.jstage.jst.go.jp/article/transfun/E107.A/3/E107.A_2023CIP0018/_pdf","source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.jstage.jst.go.jp/article/transfun/E107.A/3/E107.A_2023CIP0018/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065749480","display_name":"Takayuki Sasaki","orcid":"https://orcid.org/0000-0002-0452-8211"},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Takayuki SASAKI","raw_affiliation_strings":["Yokohama National University"],"affiliations":[{"raw_affiliation_string":"Yokohama National University","institution_ids":["https://openalex.org/I180203408"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111794710","display_name":"M. Kawaguchi","orcid":null},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mami KAWAGUCHI","raw_affiliation_strings":["Yokohama National University"],"affiliations":[{"raw_affiliation_string":"Yokohama National University","institution_ids":["https://openalex.org/I180203408"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034274743","display_name":"Takuhiro Kumagai","orcid":null},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takuhiro KUMAGAI","raw_affiliation_strings":["Yokohama National University"],"affiliations":[{"raw_affiliation_string":"Yokohama National University","institution_ids":["https://openalex.org/I180203408"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028367744","display_name":"Katsunari Yoshioka","orcid":"https://orcid.org/0000-0003-0964-8631"},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Katsunari YOSHIOKA","raw_affiliation_strings":["Yokohama National University"],"affiliations":[{"raw_affiliation_string":"Yokohama National University","institution_ids":["https://openalex.org/I180203408"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108109302","display_name":"Tsutomu Matsumoto","orcid":null},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tsutomu MATSUMOTO","raw_affiliation_strings":["Yokohama National University"],"affiliations":[{"raw_affiliation_string":"Yokohama National University","institution_ids":["https://openalex.org/I180203408"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5065749480"],"corresponding_institution_ids":["https://openalex.org/I180203408"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13650748,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"E107.A","issue":"3","first_page":"291","last_page":"305"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9933232665061951},{"id":"https://openalex.org/keywords/telnet","display_name":"Telnet","score":0.7468293309211731},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7119817137718201},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6425321698188782},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.5482443571090698},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2976537346839905},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.25017768144607544},{"id":"https://openalex.org/keywords/file-transfer-protocol","display_name":"File Transfer Protocol","score":0.08618304133415222}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9933232665061951},{"id":"https://openalex.org/C2776538122","wikidata":"https://www.wikidata.org/wiki/Q160470","display_name":"Telnet","level":4,"score":0.7468293309211731},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7119817137718201},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6425321698188782},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.5482443571090698},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2976537346839905},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25017768144607544},{"id":"https://openalex.org/C169485995","wikidata":"https://www.wikidata.org/wiki/Q42283","display_name":"File Transfer Protocol","level":3,"score":0.08618304133415222}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transfun.2023cip0018","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1587/transfun.2023cip0018","pdf_url":"https://www.jstage.jst.go.jp/article/transfun/E107.A/3/E107.A_2023CIP0018/_pdf","source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1587/transfun.2023cip0018","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1587/transfun.2023cip0018","pdf_url":"https://www.jstage.jst.go.jp/article/transfun/E107.A/3/E107.A_2023CIP0018/_pdf","source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6200000047683716,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4386823106.pdf"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W313385724","https://openalex.org/W1479215706","https://openalex.org/W1551469486","https://openalex.org/W1669806660","https://openalex.org/W2085457667","https://openalex.org/W2316818372","https://openalex.org/W2360903897","https://openalex.org/W2512166484","https://openalex.org/W2540831950","https://openalex.org/W2605157567","https://openalex.org/W2635012095","https://openalex.org/W2773671833","https://openalex.org/W2793473485","https://openalex.org/W2804406876","https://openalex.org/W2884860765","https://openalex.org/W3041912091","https://openalex.org/W4288057737","https://openalex.org/W4378364088"],"related_works":["https://openalex.org/W2782717270","https://openalex.org/W178168142","https://openalex.org/W4232715385","https://openalex.org/W2254955413","https://openalex.org/W2182300180","https://openalex.org/W4316658914","https://openalex.org/W2956011222","https://openalex.org/W2352475565","https://openalex.org/W2742579858","https://openalex.org/W4313484479"],"abstract_inverted_index":{"In":[0,60],"recent":[1],"years,":[2],"cyber":[3],"attacks":[4,29,49,69],"against":[5,30,50],"infrastructure":[6,31,52,77],"have":[7,25],"become":[8],"more":[9],"serious.":[10],"Unfortunately,":[11],"infrastructures":[12],"with":[13,120],"vulnerable":[14],"remote":[15,156],"management":[16,157],"devices,":[17],"which":[18],"allow":[19],"attackers":[20,37,56],"to":[21,96,122,130,164],"control":[22],"the":[23,48,66,75,98,105,110,140,170],"infrastructure,":[24],"been":[26],"reported.":[27],"Targeted":[28],"are":[32,45],"conducted":[33],"manually":[34],"by":[35,103],"human":[36],"rather":[38],"than":[39],"automated":[40],"scripts.":[41],"Here,":[42],"open":[43],"questions":[44],"how":[46],"often":[47],"such":[51,150],"happen":[53],"and":[54,70,126,138,166],"what":[55],"do":[57],"after":[58],"intrusions.":[59],"this":[61],"empirical":[62],"study,":[63],"we":[64],"observe":[65],"accesses,":[67],"including":[68],"security":[71],"investigation":[72],"activities,":[73],"using":[74],"customized":[76],"honeypot.":[78,171],"The":[79],"proposed":[80],"honeypot":[81,114,141,146],"comprises":[82],"(1)":[83],"a":[84,94,155],"platform":[85],"that":[86],"easily":[87],"deploys":[88],"real":[89],"devices":[90],"as":[91,151],"honeypots,":[92],"(2)":[93],"mechanism":[95,119],"increase":[97],"number":[99],"of":[100,154,169],"fictional":[101],"facilities":[102],"changing":[104,152],"displayed":[106],"facility":[107],"names":[108],"on":[109],"WebUI":[111,165],"for":[112,133,142],"each":[113],"instance,":[115],"(3)":[116],"an":[117],"interaction":[118],"visitors":[121,132],"infer":[123],"their":[124],"purpose,":[125],"(4)":[127],"tracking":[128],"mechanisms":[129],"identify":[131],"long-term":[134,162],"activities.":[135],"We":[136,159],"implemented":[137],"deployed":[139],"31":[143],"months.":[144],"Our":[145],"observed":[147,161],"critical":[148],"operations,":[149],"configurations":[153],"device.":[158],"also":[160],"access":[163],"Telnet":[167],"service":[168]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
