June 9, 2019
Publications
>
Article
No

Versatile virtual honeynet management framework

Publicated to: IET Information Security. 11 (1): 38-45 - 2017-01-01 11(1), DOI: 10.1049/iet-ifs.2015.0256

Authors:

Fan, WJ; Fernández, D; Du, ZH
[+]

Affiliations

Tsinghua Univ, Dept Comp Sci & Technol, Tsinghua Natl Lab Informat Sci & Technol, Beijing 100084, Peoples R China - Author
Univ Politecn Madrid, ETSI Telecomunicac, Dept Ingn Sistemas Telemat, E-28040 Madrid, Spain - Author

Abstract

Honeypots are designed to investigate malicious behaviour. Each type of homogeneous honeypot system has its own characteristics in respect of specific security functionality, and also suffers functional drawbacks that restrict its application scenario. In practical scenarios, therefore, security researchers always need to apply heterogeneous honeypots to cope with different attacks. However, there is a lack of general tools or platforms that can support versatile honeynet deployment in order to investigate the malicious behavior. In this study, the authors propose a versatile virtual honeynet management tool to address this problem. It is a flexible tool that offers security researchers the versatility to deploy various types of honeypots. It can also generate and manage the virtual honeynet through a dynamic configuration approach adapting to the mutable network environment. The experimental results demonstrate that this tool is effective to perform automated honeynet deployment toward a variety of heterogeneous honeypots.
[+]

Keywords

Automated honeynet deploymentDynamic configuration approachHeterogeneous honeypotsMalicious behaviourMutable network environmentSecurity of dataSoftware managementSoftware toolsSpecific security functionalityTechnology dependencyVersatile virtual honeynet management tool

Quality index

Bibliometric impact. Analysis of the contribution and dissemination channel

The work has been published in the journal IET Information Security due to its progression and the good impact it has achieved in recent years, according to the agency Scopus (SJR), it has become a reference in its field. In the year of publication of the work, 2017, it was in position , thus managing to position itself as a Q2 (Segundo Cuartil), in the category Computer Networks and Communications. Notably, the journal is positioned en el Cuartil Q3 for the agency WoS (JCR) in the category Computer Science, Theory & Methods.

Independientemente del impacto esperado determinado por el canal de difusión, es importante destacar el impacto real observado de la propia aportación.

Según las diferentes agencias de indexación, el número de citas acumuladas por esta publicación hasta la fecha 2026-04-27:

  • WoS: 13
  • Scopus: 20
[+]

Impact and social visibility

From the perspective of influence or social adoption, and based on metrics associated with mentions and interactions provided by agencies specializing in calculating the so-called "Alternative or Social Metrics," we can highlight as of 2026-04-27:

  • The use of this contribution in bookmarks, code forks, additions to favorite lists for recurrent reading, as well as general views, indicates that someone is using the publication as a basis for their current work. This may be a notable indicator of future more formal and academic citations. This claim is supported by the result of the "Capture" indicator, which yields a total of: 31 (PlumX).

It is essential to present evidence supporting full alignment with institutional principles and guidelines on Open Science and the Conservation and Dissemination of Intellectual Heritage. A clear example of this is:

  • Assignment of a Handle/URN as an identifier within the deposit in the Institutional Repository: https://oa.upm.es/45390/

As a result of the publication of the work in the institutional repository, statistical usage data has been obtained that reflects its impact. In terms of dissemination, we can state that, as of

  • Views: 515
  • Downloads: 621
[+]

Leadership analysis of institutional authors

This work has been carried out with international collaboration, specifically with researchers from: China.

There is a significant leadership presence as some of the institution’s authors appear as the first or last signer, detailed as follows: First Author (FAN, WENJUN) .

the author responsible for correspondence tasks has been FAN, WENJUN.

[+]

Awards linked to the item

This research is supported in part by the National Natural Science Foundation of China (nos. 61440057, 61272087, 61363019 and 61073008), the Beijing Natural Science Foundation (nos. 4082016 and 4122039), the Sci-Tech Interdisciplinary Innovation and Cooperation Team Program of the Chinese Academy of Sciences, the Specialized Research Fund for State Key Laboratories. It is also partially funded with support from the Spanish MICINN (project RECLAMO, Virtual and Collaborative Honeynets based on Trust Management and Autonomous Systems applied to Intrusion Management, with codes TIN2011-28287- C02-01 and TIN2011-28287-C02-02) and the European Commission (FEDER/ERDF).
[+]