{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T06:36:28Z","timestamp":1726209388288},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319302218"},{"type":"electronic","value":"9783319302225"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-30222-5_9","type":"book-chapter","created":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T08:45:11Z","timestamp":1456821911000},"page":"179-200","source":"Crossref","is-referenced-by-count":6,"title":["A Scalable Honeynet Architecture for Industrial Control Systems"],"prefix":"10.1007","author":[{"given":"Alexandru Vlad","family":"Serbanescu","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Obermeier","sequence":"additional","affiliation":[]},{"given":"Der-Yeuan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,1]]},"reference":[{"key":"9_CR1","unstructured":"Asgarkhani, M., Sitnikova, E.: A strategic approach to managing security in SCADA systems. In: Proceedings of the 13th European Conference on Cyber warefare and Security, pp. 23\u201332. Academic Conferences and Publishing International Limited, July 2014"},{"key":"9_CR2","unstructured":"Beale, J., Baker, A., Esler, J., Kohlenberg, T., Northcutt, S.: Snort: IDS and IPS Toolkit. Jay Beale\u2019s open source security series. Syngress (2007). http:\/\/books.google.ch\/books?id=M9plZZxJB_UC"},{"issue":"2","key":"9_CR3","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.ijcip.2014.03.001","volume":"7","author":"R Bodenheim","year":"2014","unstructured":"Bodenheim, R., Butts, J., Dunlap, S., Mullins, B.: Evaluation of the ability of the shodan search engine to identify internet-facing industrial control devices. Int. J. Crit. Infrastruct. Prot. 7(2), 114\u2013123 (2014). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1874548214000213","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Bodenheim, R.C.: Impact of the Shodan Computer Search Engine on Internet-facing Industrial Control System Devices. Master\u2019s Thesis, AIR FORCE INSTITUTE OF TECHNOLOGY WRIGHT-PATTERSON AFB OH, March 2014. http:\/\/www.dtic.mil\/cgi-bin\/GetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA601219","DOI":"10.1016\/j.ijcip.2014.03.001"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-319-10329-7_12","volume-title":"Smart Grid Security","author":"DI Buza","year":"2014","unstructured":"Buza, D.I., Juh\u00e1sz, F., Miru, G., F\u00e9legyh\u00e1zi, M., Holczer, T.: CryPLH: protecting smart energy systems from targeted attacks with a PLC honeypot. In: Cuellar, J. (ed.) SmartGridSec 2014. LNCS, vol. 8448, pp. 181\u2013192. Springer, Switzerland (2014)"},{"key":"9_CR6","unstructured":"Byres, E.: Project SHINE: 1,000,000 internet-connected SCADA and ICS systems and counting, September 2013"},{"key":"9_CR7","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-45330-4_6","volume-title":"Critical Infrastructure Protection VII","author":"Y Deng","year":"2013","unstructured":"Deng, Y., Shukla, S.: A distributed real-time event correlation architecture for SCADA security. In: Butts, J., Shenoi, S. (eds.) Critical Infrastructure Protection VII. IFIP AICT, vol. 417, pp. 81\u201393. Springer, Heidelberg (2013). http:\/\/dx.doi.org\/10.1007\/978-3-642-45330-4_6"},{"key":"9_CR8","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-642-45330-4_15","volume-title":"Critical Infrastructure Protection VII","author":"A Pietro Di","year":"2013","unstructured":"Di Pietro, A., Foglietta, C., Palmieri, S., Panzieri, S.: Assessing the impact of cyber attacks on interdependent physical systems. In: Butts, J., Shenoi, S. (eds.) Critical Infrastructure Protection VII. IFIP AICT, vol. 417, pp. 215\u2013227. Springer, Heidelberg (2013). http:\/\/dx.doi.org\/10.1007\/978-3-642-45330-4_15"},{"key":"9_CR9","unstructured":"ICS - CERT: Increasing threat to industrial control systems (update A), May 2013. https:\/\/ics-cert.us-cert.gov\/alerts\/ICS-ALERT-12-046-01A"},{"key":"9_CR10","unstructured":"Ponemon Institute: Critical infrastructure: Security preparedness and maturity. Technical report, Unysis, July 2014. http:\/\/www.unisys.com\/insights\/critical-infrastructure-security"},{"key":"9_CR11","unstructured":"Morris, T.H., Gao, W.: Industrial control system cyber attacks. In: Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research (2013). http:\/\/ewic.bcs.org\/content\/ConWebDoc\/51165"},{"key":"9_CR12","unstructured":"NIST: Guide to General Server Security - Recommendations of the National Institute of Standards and Technology, July 2008. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-123\/SP800-123.pdf"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L., Chen, H.: Uninvited connections: a study of vulnerable devices on the internet of things (IoT). In: 2014 IEEE Joint Intelligence and Security Informatics Conference (JISIC), pp. 232\u2013235, September 2014","DOI":"10.1109\/JISIC.2014.43"},{"key":"9_CR14","unstructured":"Robinson, M.: The SCADA threat landscape. In: Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research (2013). http:\/\/ewic.bcs.org\/content\/ConWebDoc\/51166"},{"key":"9_CR15","unstructured":"Scott, C.: Designing and implementing a honeypot for a SCADA network. Technical report, The SANS Institute, June 2014"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Serbanescu, A.V., Obermeier, S., Yu, D.: A flexible architecture for industrial control system honeypots. In: Proceedings of the 12th International Conference on Security and Cryptography, SECRYPT 2015, Colmar, Alsace, France, pp. 16\u201326, 20\u201322 July 2015. http:\/\/dx.doi.org\/10.5220\/0005522500160026","DOI":"10.5220\/0005522500160026"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Serbanescu, A.V., Obermeier, S., Yu, D.: ICS threat analysis using a large-scale honeynet. In: 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, ICS-CSR 2015. University of Applied Sciences Ingolstadt, Germany, 17\u201318 September 2015. http:\/\/ewic.bcs.org\/content\/ConWebDoc\/55096","DOI":"10.14236\/ewic\/ICS2015.3"},{"key":"9_CR18","unstructured":"Wade, S.M.: SCADA Honeynets: The attractiveness of honeypots as critical infrastructure security tools for the detection and analysis of advanced threats. Master\u2019s Thesis, Iowa State University, Ames, Iowa (2011). http:\/\/lib.dr.iastate.edu\/cgi\/viewcontent.cgi?article=3130&context=etd"},{"key":"9_CR19","unstructured":"Wilamowski, B.M., Irwin, J.D.: The Industrial Electronics Handbook - Industrial Communications Systems, 2nd edn., vol. 2. CRC Press, Taylor & Francis Group, Boca Raton, London (2011)"},{"key":"9_CR20","unstructured":"Wilhoit, K.: The SCADA that didnt cry wolf - whos really attacking your ICS equipment? - part deux! (2013). black Hat US 2013"},{"key":"9_CR21","unstructured":"Wilhoit, K.: Whos really attacking your ICS equipment? (2013). black Hat Europe 2013"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-319-04918-2_22","volume-title":"Passive and Active Measurement","author":"YG Zeng","year":"2014","unstructured":"Zeng, Y.G., Coffey, D., Viega, J.: How vulnerable are unprotected machines on the internet? In: Faloutsos, M., Kuzmanovic, A. (eds.) PAM 2014. LNCS, vol. 8362, pp. 224\u2013234. Springer, Heidelberg (2014). http:\/\/dx.doi.org\/10.1007\/978-3-319-04918-2_22"}],"container-title":["Communications in Computer and Information Science","E-Business and Telecommunications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-30222-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T04:11:27Z","timestamp":1567656687000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-30222-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319302218","9783319302225"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-30222-5_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}