<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Deploying a University Honeypot: A case study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Rasmi Vlad Mahmoud</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jens Myrup Pedersen</string-name>
          <email>jens@es.aau.dk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Electronic Systems, Aalborg University</institution>
          ,
          <addr-line>Aalborg East, DK-9220</addr-line>
          ,
          <country country="DK">Denmark</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The cyber threat against all parts of our societies is constantly growing, and while some attacks are carried out by cyber criminals for nancial gains, others have strong strategic values and are likely to be carried out by nation state actors. One group of institutions that experience the growing cyber threat is universities: Universities are attractive targets because they often possess valuable research knowledge, and because universities traditionally have promoted an openness culture. At the same time, they face challenges in maintaining a high level of cyber security, since many people have system and physical access, and because there are many legacy systems in use. In order to build an e cient cyber defense it is crucial to understand the always changing threat picture, so the countermeasures can be adapted accordingly. However, doing so requires updated information about the attacks from a variety of sources. While many of these sources, e.g. threat assessment reports from intelligence agencies, come with regular intervals or in case of signi cant changes, this paper explores a way of getting real-time information about current attack attempts towards a speci c university: Honeypots. The paper contributes by discussing advantages and disadvantages of di erent kinds of honeypots in a university setting, and it demonstrates how results can be achieved through actual honeypot implementations. Our conclusion is that honeypots are a valuable supplement to other sources of intelligence, but it is crucial to choose the right types and architectures.</p>
      </abstract>
      <kwd-group>
        <kwd>Honeypots</kwd>
        <kwd>Cyber Security</kwd>
        <kwd>Risk assessment</kwd>
        <kwd>Universities</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The increasing cyber risks in general are documented through multiple sources.
In the USA alone, o cial sources have estimated that malicious cyber activity
cost the U.S. economy between $57 billion and $109 billion in 2016, a number
that is only expected to grow. Universities are dealing with speci c cyber
security threats due to to their handling of research data, as well as data required for
their normal operation, e.g. information about students and researchers. While
universities carry out a large variety of activities, they do not have typical
organisational boundaries and therefore need to establish custom security policies
to accustom their needs [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>
        A report published by Cisco in 2018 focuses on cyber security in the
public sector, with a particular focus on education. More than half of the higher
educational institutions (58%), reported that they had experienced at least one
security breach, a percentage which is the highest over all public sector
industries. This type of breach is most of the time identi ed with damage to the
institution reputation. Nearly 51% of the attacks resulted in loss of money, in
total over 500:000$ for the universities [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        The challenge has also been identi ed in a Danish context. The Danish
Defence Intelligence Service Center for Cyber Security (CFCS) stated in February
2017 that foreign states are conducting acts of espionage against Danish
research. The curiosity is generated both from political and commercial motives,
but nonetheless assailants were interested also in the institutions infrastructures
that can be used for attacking other public Danish institutions [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. It is an
ongoing discussion within the research and educational sector how these challenges
can be met without compromising on the openness culture of the universities.
      </p>
      <p>As in other organisations, a number of initiatives are currently being taken
to heighten the level and matureness of cyber security in universities. Danish
universities are no exception, and the initiatives include awareness campaigns,
updated password policies, installation of IDS/IPS systems and so on. Ideally
these initiatives are taken based on an analysis of risks and consequences, but
we claim that often such analysis is based on a combination of assumptions
and outdated/partial information: Little is known about the actual and current
threat picture faced by each organisation.</p>
      <p>
        In this paper, we investigate how honeypots can be used to achieve current
information about actual attempts of attacking universities. The work is based
on a master thesis project [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], and contains two main contributions. First it is
analysed which honeypots are more suited for a university setting, and second
the results of an actual honeypot deployment is presented and discussed.
      </p>
      <p>The rest of the paper is organised as follows: In Section 2 we provide a
background on di erent kinds of honeypots and analyse which honeypots are
most suited for a university setting. Next, selected honeypots are deployed as
described in Section 3, and in Section 4 we present the results obtained. Section
5 presents the conclusion and discussions.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>A honeypot can be de ned as a trap, where potential attackers are lured into
a seemingly operational network, which is really established in order to attract
hackers and study their behaviors. To serve this purpose, it is created to look as
realistic as possible from the outside, while at the same time containing relevant
tools that allow the operator of the honeypot to monitor and analyse the behavior
of visitors. An example of a honeypot is depicted in Figure 1.</p>
      <p>Based on the level of interactions determined by the availability of commands
and the feedback that an attacker is experiencing when he is trapped inside,
honeypots can be classi ed into three groups:
{ Low-Interaction Honeypots (LIHP)
{ Medium-Interaction Honeypots (MIHP)
{ High-Interaction Honeypots (HIHP)</p>
      <p>These will be described in the following.</p>
      <p>
        LIHP - emulate a limited range of available services for the attackers to use.
The main characteristic is that these types of honeypot are not having an
operating system. Their main advantages are the facts that they are easy to
deploy and maintain, yet they are excellent statistical tools. However, they
are limited when it comes to detection of new attack patterns. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]
MIHP - no operating system is present, but in contrast to LIHP they are
capable of keeping the attacker engaged by answering to his commands.
Nonetheless, the emulated services are more complex than LIHP. Both LIHP
and MIHP present a low risk of being compromised, determined by the
possibility of commands.[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]
HIHP - this type of honeypots is o ering a real and unrestricted operating
system to the attacker, and therefore is more complex in deployment and
maintenance. Due to a large variety of information: monitoring services,
attack logs, data access and le traversing that are stored in these types of
honeypots, the processing of data needs to be done manually, and
consequently it requires more time for deployment and maintenance. Moreover,
these types of honeypots provide a high risk of compromise. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]
In Table 1 the information in relation to LIHP, MIHP and HIHP is grouped
into four levels Low, Medium, High and Very High based on the required initial
knowledge, amount of information, maintenance time and risk of being
compromised.
      </p>
      <p>In addition, honeypots can be also classi ed based on their function as either
Production or Research honeypots:</p>
      <p>
        Research honeypots - are mainly used by educational, military or
governmental institutions to gain information about the attackers' tactics, techniques
and procedures(TTPs). This type of honeypots are not bringing direct value
to the organization and require high maintenance time, on the other hand
the type of information that they are providing is important for
organizations to develop new policies to stay ahead of the cyber threats.[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]
Production honeypots s - are speci c for companies and are mostly placed
inside production networks, since they present a lower risk of being
compromised. These honeypots are used to increase overall security, as well for
decoy systems which works by deceiving the attackers and alerting the
administrators about the activity.
2.1
      </p>
      <sec id="sec-2-1">
        <title>Review of Honeypot Usage</title>
        <p>
          In this section, a short review of existing honeypot studies is provided. There
are several studies that were directed towards honeypots in the last years. Two
projects worth highlighting are a project carried out by German Telekom [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] as
well as the Leurre project [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Telekom used the information collected to protect
their own systems, but also shares the data with security vendors. Unfortunately
little has been published, and as such there are no further publications where
the data is evaluated [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. The Leurre project was stopped in 2008, but their data
related to observed attacks was published.
        </p>
        <p>
          Other large honeypot strategies include the NoAH project [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] and the
Honeynet project [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], while more recently a number of projects concentrate on a
small number of sensors and a short period of time [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. The honeynet project is a
collaborative project, that is focusing the research on the black-hat community
tools, tactics and procedures and then sharing the insight knowledge. The
organization is composed from international security professionals who have deployed
honeynets with the goal of further analysing the results.
        </p>
        <p>
          The Finnish security company F-Secure is using honeypots to determine the
landscape and the threat model of the years [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
        </p>
        <p>The data from these di erent projects provide useful statistics on the general
threat picture, and can be a help in determining for example which protocols and
countries to pay particular attention to. Also, much of the activity that is caught
comes from automatic scanners, which tries to scan all possible Internet hosts
without di erentiating between companies, universities, and other organisations.
However, they provide little insight into the particular threats towards
universities. This challenge is studied further in the next section, where we analyse the
requirements for establishing a university honeypot.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>University Honeypots</title>
        <p>
          Educational and research institutions are special types of organizations due to
their variety of activities. Nonetheless, universities have claimed that due to
budget limitations and lack of trained personnel they are facing huge impediments
in relation to cyber security policies. In addition, the 2018 Cisco report over the
public sector is stating that universities have employed only half of the medium
number of security personal that other comparable organisations employ [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
Therefore, a solution is needed which do not require a lot of time for deployment
and maintenance, while the information provided by the system should still be
valuable for the organizations.
        </p>
        <p>Universities are sitting with large amounts of data that come in many forms
such as intellectual property, personal data from employees and students, as well
as research data from third parties, some of which can be business critical. For
this reason security is an important aspect. Also, while honeypots can provide
large amounts of data, in order to become valuable for universities this data need
to be organized in a manner that facilitates automatic processing.</p>
        <p>LIHP are good choices. Not only do they have the lowest necessary time of
deployment and maintenance, they also present a low risk of being compromised
due to the fact that they are not having an actual operating system. Nonetheless,
the LIHP are able to provide an overview of the attacked protocols, the sources
of the attacks as well as combinations of passwords and user-names used when
services are probed. In addition, these type of honeypots are not requesting a
long time to be spent daily for monitoring, and data generated by them can be
structured for automatic processing. In addition to LIHP some MIHP might be
relevant to consider as well, given an individual assessment of added value in
terms of information gain versus the additional e orts in maintainance and risk
management.</p>
        <p>In the next section, the paper will go more in depth with the actual
deployment of honeypots in a university environment.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Honeypots on AAU's Network</title>
      <p>The following section will present the honeypots of choice together with the
architecture and how they are integrated with the network of Aalborg
University(AAU). There are many available honeypots, but some of them are already
outdated and can present security risks, and so we narrowed down the choice to
honeypots that are maintained and still in use. The chosen honeypots can
emulate common services used at universities such as SSH, FTP, HTTP, HTTPS,
SMTP and RDP.</p>
      <p>Cowrie is a MIHP honeypot that is emulating SSH and Telnet protocols. It
is recording the interactions that an attacker is having with the honeypot.
Cowrie is chosen despite being a MIHP since it is the newest honeypot
to emulate SSH and Telnet, and since it is easy to setup and maintain.
Furthermore, it is considered secure to run since it is not running a real
operating system, and since the amount of o ered commands is limited.
Dionaea is a LIHP honeypot capable of o ering a number of protocols
including: Server Message Block (SMB), HTTP, FTP, Microsoft SQL Server
(MSSQL), and Voice over Internet Protocol (VoIP).</p>
      <p>Heralding is a LIHP designed to store the used credentials. The emulated
protocols are Hypertext Transfer Protocol (HTTP), Hypertext Transfer
Protocol Secure (HTTPS), Post O ce Protocol 3 (POP3), Post O ce Protocol
3 Secure (POP3S) and Internet Message Access Protocol (IMAP).
Mailoney is a LIHP that is mimicking a classic mail server by exposing the
Simple Mail Transfer Protocol(SMTP).</p>
      <p>RDPY is a LIHP that imitates the Windows protocol, Remote Desktop
Protocol(RDP).
3.1</p>
      <sec id="sec-3-1">
        <title>Honeypots Deployment</title>
        <p>
          Honeypots were deployed using Docker which is an open-source platform for
running, developing and distributing applications. Docker o ers the possibility
of grouping all the necessary dependencies inside one package, named container,
which is o ering isolation, abstraction and security [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Therefore, the
honeypots were deployed into individual containers to ensure isolation and also to
avoid any errors to escalate. In Figure 2 the honeypots relation with Docker is
demonstrated, and the approach is presented horizontally.
        </p>
        <p>For bringing more value to the architecture, the honeypots were integrated
with AAU's existing network, and the following subsection will present a general
overview of how the integration was made.</p>
      </sec>
      <sec id="sec-3-2">
        <title>Honeypots Integration with AAU's Network</title>
        <p>Docker was hosted on a Virtual Private Server (VPS) provided by AAU. Figure 3
gives an overview of the architecture. The VPS was con gured on a small subnet
(X.X.X.113/29) that was sitting outside AAU's main rewall, and a rewall
(see the gure) was setup by us to control the tra c to and from the VPS.
For this reason, the VPS had a principal network interface used exclusively for
administration purposes, the connection was established over SSH, and a number
of secondary network interfaces were created in software for the honeypots.</p>
        <p>Considering the design from a security perspective, tra c originated from
the VPS was not allowed to go back to AAU's network. As a consequence all
tra c to the Internet was freely allowed, since it was also important to keep the
appearances and to not raise any suspicions for the attackers. In addition, four
secondary network interfaces were created and the IPs were distributed across
the docker containers. The primary containers behaviour was modi ed by
assigning a public static IP address to every container in order to integrate them
with the existing AAU's network.</p>
        <p>All the interactions with the honeypots are stored individually in log les
and therefore a method to structure and analyze the les is presented in the
following subsection.
3.3</p>
      </sec>
      <sec id="sec-3-3">
        <title>Logs Processing</title>
        <p>Given this container based architecture, where the log les are saved
individually, a method to centralize the logs was adopted. Graylog has been used as the
log management tool, and together with its dependencies it was deployed inside
Docker containers on the same VPS. Once the log les are sent to Graylog, their
management is handled by storing the information in Elasicsearch and the
neccessary Graylog settings in MongoDB. In Figure 4 the proposed architecture for
this part is presented in order to o er a better understanding of the components
and their relation:</p>
        <p>The following section will present and analyze the results recorded by the
honeypots by focusing on the probed protocols.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Results Of Honeypots</title>
      <p>The honeypots were initially started on May 13 2019, and their activity was
monitored for a period of 30 days. They were con gured to monitor di erent
kinds of intrusions including scanning and login attempts: In the following, we
refer to these altogether as "connection attempts". During the recording period a
total number of 780:305 connection attempts were registered. The SSH protocol
was the one recording most of the attacks, but the following protocols were also
targeted: RDP, HTTP, TELNET and HTTPS. The majority of the sessions
created came from Ireland (72%), followed by Netherlands (20%), China (2%),
Jordan (1%), and Germany (1%).</p>
      <p>In Figure 5 the top 10 countries based on the number of attempts are
displayed. The countries presented are considered to be the last hop of the attacks,
since is not possible to identify from the logs if the attackers are using proxies.</p>
      <p>In the following subsections the honeypots that were deployed will be
presented one by one and their results will be described and analyzed.
Considering that the majority of the connections were addressed to the SSH
protocol generated by Cowrie it is valuable to get an overview of the activity.
There were a total number of 725:993 connection attempts oriented to the SSH
protocol. From the total number of connections nearly 240:000 were direct tcp/ip
requests from the honeypot to a company based in Russia that is o ering di erent
Internet services, Ya.ru. Therefore, there is a clear tendency of using the attacked
machine as a proxy and launch attacks from that to other devices. However, it is
beyond the scope of this study to analyse whether the attacker actually knows
that he is inside a honeypot, which he could then deliberately try to use as a
proxy for his attacks.
4.2</p>
      <sec id="sec-4-1">
        <title>Dionaea</title>
        <p>Dionaea is the honeypot that is emulating the highest number of protocols.
Figure 6 provides an overview of the most attacked protocols, and the relation
with the source country is presented.</p>
        <p>Additionally, this honeypot was also registering usage of generic usernames
such as sa, root, admin, mssqla or server, together with passwords like 12345678,
password, 1qaz2wsx, abc123, and qwerty. Nonetheless, binary and bitstream les
were collected, but no thorough analysis was performed during the development
of this project.
4.3</p>
      </sec>
      <sec id="sec-4-2">
        <title>Heralding</title>
        <p>This honeypot demonstrated a trend in the attacks towards less secure protocols
such as HTTP. Moreover, Figure 7 shows the representation of top 5 protocols
together with the total number of attempts.</p>
        <p>From the total number of attempts, a percentage of 32:30% were using
combinations of usernames and passwords such as admin-admin,root-root,
postgresqlpostgresql and Cisco-Cisco. As such, attackers were inclined to use sequences
where the service name was used both as a username and password. Moreover
apart from the service names, usernames also include admin, super, superadmin,
user or support. Also additional passwords were used between the groups such
as root, cisco, admin, or support.
4.4</p>
      </sec>
      <sec id="sec-4-3">
        <title>Rdpy and Mailoney</title>
        <p>For Rdpy and Mailoney the number of connections were lower than for the other
honeypots, but nonetheless interesting: Rdpy was registering attacks from
Jordan, USA, Russia, Ivory Coast and China. The main number of the attacks were
originating from an USA IP address that was already known as an infected
device primarily used for DDOS attacks via IoT devices.</p>
        <p>Furthermore, for Mailoney the attacks were linked back to USA, China, and
Ireland. The origins of the connections were the IP addresses that are known to
host malicious botnet activities. The activity that was most recorded was to use
this honeypot as an open relay by trying to connect to other mail-servers for
sending spam emails. Domains such as sh-chi-us-gp1-wk108.internet-census.org
and zx2.quadmetrics.com were contacted, all of which are already blacklisted
domains due to spam activity.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>In the last years, cyber security has gotten on top of the agenda in many public
and private organisations: The risks are increasing both from cyber criminals
driven by pro t and nation states driven by more strategic interests. In this
situation, universities are facing themselves with a high risk due to their
valuable research data as well as personal data for their operations, while at the
same time trying to maintain an open culture. Having a good and actual view
of the current attack picture is crucial in order to take the right
countermeasures. This paper investigated how honeypots can contribute to achieving such
a better picture: Through an analysis of di erent honeypot techniques it was
found that low interaction honeypots can provide valuable information while
at the same time keeping the risks low and minimizing the exposure of
critical information. Among the results were that during a 30 day period more
than 725:000 connection attempts were oriented towards SSH with the majority
coming from Ireland, Netherlands and China. Looking at other protocols, many
connections were coming from also China, India and Philippines. It was also
revealed which protocols were most often targeted, along with the most
commonly guesses of usernames/passwords. The results demonstrate that honeypots
can provide valuable and timely information to universities about the current
threat picture. There is however a trade-o between ease of use, con guration
and analysis on one hand, and the amount of information that can be achieved on
the other. However, it does not help anyone that information is collected if it is
not actually used. In order to make the information operational, future research
could focus on how to present and integrate the results for the risk management
organisation, but also on how a collaborative approach could be taken among
universities to identify trends and ongoing attacks as early as possible.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Noah</surname>
          </string-name>
          <article-title>- a european network of a ned honeypots (</article-title>
          <year>2018</year>
          ), https://cordis.europa. eu/docs/publications/1201/120142541-6_en.pdf, [Online; accessed 18-August2019]
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Cisco</surname>
          </string-name>
          <article-title>: 2018 annual cybersecurity report impacts on public-sector (</article-title>
          <year>2018</year>
          ), https: //www.cisco.com/c/dam/m/digital/elq-cmcglobal/OCA/Assets/Federal/ 2018-Annual-Cybersecurity
          <source>-Report-Impacts-on-Public-Sector.pdf?ccid= cc000126&amp;oid=rptsc008809&amp;elqTrackId=64397bd4bdfd4bf6a6cde2dee70f3e6e&amp; elqaid=4518&amp;elqat=2</source>
          , [Online; accessed 08-March-2019]
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>3. for Cyber Security (CFCS</article-title>
          ),
          <string-name>
            <surname>D.D.I.S.C.</surname>
          </string-name>
          :
          <article-title>Foreign hackers threaten danish public research (</article-title>
          <year>2017</year>
          ), https://fe-ddis.dk/cfcs/publikationer/Documents/TV% 20forskning%
          <fpage>20ENG</fpage>
          .pdf, [Online; accessed 08-March-2019]
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. DTAG, T.: Fruhwarnsystem, sicherheitstacho (
          <year>2013</year>
          ), http://www. sicherheitstacho.eu/, [Online; accessed 11-March-2019]
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>F</given-names>
            <surname>-Secure</surname>
          </string-name>
          :
          <article-title>Attack landscape h1</article-title>
          <year>2018</year>
          (
          <year>2018</year>
          ), http://images.secure.f-secure. com/Web/FSecure/%7Ba1352f14-be26
          <string-name>
            <surname>-</surname>
          </string-name>
          4fd1
          <string-name>
            <surname>-</surname>
          </string-name>
          bcc8
          <article-title>-3c9bd6b20bd3%7D_Attack_ Landscape-H1-2018</article-title>
          .pdf, [Online; accessed 11-March-2019]
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Fraunholz</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zimmermann</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hafner</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schotten</surname>
            ,
            <given-names>H.D.</given-names>
          </string-name>
          :
          <article-title>Data mining in longterm honeypot data</article-title>
          .
          <source>In: 2017 IEEE International Conference on Data Mining Workshops (ICDMW)</source>
          . pp.
          <volume>649</volume>
          {
          <fpage>656</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Leita</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pham</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thonnard</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramirez-Silva</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pouget</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kirda</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dacier</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The leurre. com project: collecting internet threats information using a worldwide distributed honeynet</article-title>
          .
          <source>In: 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing</source>
          . pp.
          <volume>40</volume>
          {
          <fpage>57</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Mahmoud</surname>
            ,
            <given-names>R.V.:</given-names>
          </string-name>
          <article-title>Honeypots on aau's network (</article-title>
          <year>2019</year>
          ), https://projekter.aau. dk/projekter/files/306402738/NDS10_Gr1024_Report.pdf, [Online; accessed 08-March-2019]
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Nawrocki</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , Wahlisch,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Schmidt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.C.</given-names>
            ,
            <surname>Keil</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          , Schonfelder, J.:
          <article-title>A survey on honeypot software and data analysis</article-title>
          .
          <source>arXiv preprint arXiv:1608.06249</source>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Rad</surname>
            ,
            <given-names>B.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bhatti</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ahmadi</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>An introduction to docker and analysis of its performance</article-title>
          .
          <source>International Journal of Computer Science and Network Security (IJCSNS) 17(3)</source>
          ,
          <volume>228</volume>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Spitzner</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>The honeynet project: trapping the hackers</article-title>
          .
          <source>IEEE Security Privacy</source>
          <volume>1</volume>
          (
          <issue>2</issue>
          ),
          <volume>15</volume>
          {23 (March
          <year>2003</year>
          ). https://doi.org/10.1109/MSECP.
          <year>2003</year>
          .1193207
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Universities</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Cyber security and universities; managing the risk</article-title>
          .
          <source>Retrieved December</source>
          <volume>31</volume>
          (
          <year>2013</year>
          ), https://www.universitiesuk.ac.uk/policy-and
          <article-title>-analysis/ reports/Documents/2013/cyber-security-and-universities</article-title>
          .pdf, [Online; accessed 03-March-2019]
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>