{"id":"https://openalex.org/W2295968388","doi":"https://doi.org/10.5220/0005620203130318","title":"Cybersecurity and Honeypots: Experience in a Scientific Network Infrastructure","display_name":"Cybersecurity and Honeypots: Experience in a Scientific Network Infrastructure","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2295968388","doi":"https://doi.org/10.5220/0005620203130318","mag":"2295968388"},"language":"en","primary_location":{"id":"doi:10.5220/0005620203130318","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005620203130318","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Joint Conference on Computational Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005620203130318","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072906116","display_name":"Juan Luis Martin Acal","orcid":null},"institutions":[{"id":"https://openalex.org/I173304897","display_name":"Universidad de Granada","ror":"https://ror.org/04njjy449","country_code":"ES","type":"education","lineage":["https://openalex.org/I173304897"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Juan Luis Martin Acal","raw_affiliation_strings":["University of Granada, Spain"],"affiliations":[{"raw_affiliation_string":"University of Granada, Spain","institution_ids":["https://openalex.org/I173304897"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026459059","display_name":"Gustavo Romero L\u00f3pez","orcid":null},"institutions":[{"id":"https://openalex.org/I173304897","display_name":"Universidad de Granada","ror":"https://ror.org/04njjy449","country_code":"ES","type":"education","lineage":["https://openalex.org/I173304897"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Gustavo Romero L\u00f3pez","raw_affiliation_strings":["University of Granada, Spain"],"affiliations":[{"raw_affiliation_string":"University of Granada, Spain","institution_ids":["https://openalex.org/I173304897"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110322903","display_name":"Pablo Palac\u00edn G\u00f3mez","orcid":null},"institutions":[{"id":"https://openalex.org/I173304897","display_name":"Universidad de Granada","ror":"https://ror.org/04njjy449","country_code":"ES","type":"education","lineage":["https://openalex.org/I173304897"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Pablo Palac\u00edn G\u00f3mez","raw_affiliation_strings":["University of Granada, Spain"],"affiliations":[{"raw_affiliation_string":"University of Granada, Spain","institution_ids":["https://openalex.org/I173304897"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035630810","display_name":"Pablo Garc\u00eda\u2010S\u00e1nchez","orcid":"https://orcid.org/0000-0003-4644-2894"},"institutions":[{"id":"https://openalex.org/I173304897","display_name":"Universidad de Granada","ror":"https://ror.org/04njjy449","country_code":"ES","type":"education","lineage":["https://openalex.org/I173304897"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Pablo Garc\u00eda S\u00e1nchez","raw_affiliation_strings":["University of Granada, Spain"],"affiliations":[{"raw_affiliation_string":"University of Granada, Spain","institution_ids":["https://openalex.org/I173304897"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063930069","display_name":"J. J. Merelo","orcid":"https://orcid.org/0000-0002-1385-9741"},"institutions":[{"id":"https://openalex.org/I173304897","display_name":"Universidad de Granada","ror":"https://ror.org/04njjy449","country_code":"ES","type":"education","lineage":["https://openalex.org/I173304897"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Juan Juli\u00e1n Merelo Guerv\u00f3s","raw_affiliation_strings":["University of Granada, Spain"],"affiliations":[{"raw_affiliation_string":"University of Granada, Spain","institution_ids":["https://openalex.org/I173304897"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033558251","display_name":"Pedro \u00c1. Castillo","orcid":"https://orcid.org/0000-0002-5258-0620"},"institutions":[{"id":"https://openalex.org/I173304897","display_name":"Universidad de Granada","ror":"https://ror.org/04njjy449","country_code":"ES","type":"education","lineage":["https://openalex.org/I173304897"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Pedro A. Castillo Valdivieso","raw_affiliation_strings":["University of Granada, Spain"],"affiliations":[{"raw_affiliation_string":"University of Granada, Spain","institution_ids":["https://openalex.org/I173304897"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5072906116"],"corresponding_institution_ids":["https://openalex.org/I173304897"],"apc_list":null,"apc_paid":null,"fwci":0.3328,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.68261289,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"313","last_page":"318"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9295542240142822},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7809898853302002},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5994693040847778},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5311618447303772},{"id":"https://openalex.org/keywords/plan","display_name":"Plan (archaeology)","score":0.5213971734046936},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3236226439476013}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9295542240142822},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7809898853302002},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5994693040847778},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5311618447303772},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.5213971734046936},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3236226439476013},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005620203130318","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005620203130318","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Joint Conference on Computational Intelligence","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005620203130318","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005620203130318","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Joint Conference on Computational Intelligence","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6100000143051147,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W116656696","https://openalex.org/W1990517717","https://openalex.org/W1990558001","https://openalex.org/W1997222770","https://openalex.org/W2126058759","https://openalex.org/W2467266439","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W178168142","https://openalex.org/W4232715385","https://openalex.org/W2254955413","https://openalex.org/W2182300180","https://openalex.org/W4316658914","https://openalex.org/W2956011222","https://openalex.org/W2352475565","https://openalex.org/W4313484479","https://openalex.org/W2742579858","https://openalex.org/W4385187164"],"abstract_inverted_index":{"When":[0],"dealing":[1],"with":[2,36],"security":[3,15,50,97],"concerns":[4,16],"in":[5,29,42,83,100,121],"the":[6,18,45,68,101,113,117,122,127,139,143],"use":[7],"of":[8,44,47,104,116,119,124,131,142],"network":[9],"infrastructures":[10],"a":[11,53,89,105],"good":[12,90],"balance":[13,95],"between":[14,96],"and":[17,39,58,73,98,129],"right":[19],"to":[20,92],"privacy":[21,70,99],"should":[22],"be":[23,77],"maintained.":[24],"This":[25],"is":[26],"very":[27],"important":[28],"scientific":[30,59,106],"networks,":[31],"because":[32],"they":[33],"were":[34],"created":[35],"an":[37,62,66],"open":[38],"decentralized":[40],"philosophy,":[41],"favor":[43],"transmission":[46],"knowledge,":[48],"when":[49],"was":[51],"not":[52],"essential":[54],"topic.":[55],"Although":[56],"private":[57],"information":[60],"have":[61],"enormous":[63],"value":[64],"for":[65,71,126],"attacker,":[67],"user":[69],"legal":[72],"ethical":[74],"reasons":[75],"must":[76],"respected.":[78],"Thus,":[79],"passive":[80],"detection":[81,128],"methods":[82],"cybersecurity":[84],"such":[85,137],"as":[86,138],"honeypots":[87,125],"are":[88],"strategy":[91],"achieve":[93],"this":[94,109],"defense":[102],"plan":[103],"network.":[107],"In":[108],"paper":[110],"we":[111],"present":[112],"practical":[114],"case":[115],"University":[118],"Granada":[120],"application":[123],"study":[130],"intrusions,":[132],"which":[133],"avoid":[134],"intrusive":[135],"techniques":[136],"direct":[140],"analysis":[141],"traffic":[144],"through":[145],"networking":[146],"devices.":[147]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
