{"id":6060,"date":"2025-09-10T12:36:18","date_gmt":"2025-09-10T10:36:18","guid":{"rendered":"https:\/\/cyberawareness.sk\/?p=6060"},"modified":"2026-03-27T12:30:03","modified_gmt":"2026-03-27T11:30:03","slug":"study-of-attack-using-honeypots-and-honeynets-lessons-learned-from-time-oriented-visualization","status":"publish","type":"post","link":"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/study-of-attack-using-honeypots-and-honeynets-lessons-learned-from-time-oriented-visualization\/","title":{"rendered":"Study of attack using honeypots and honeynets lessons learned from time-oriented visualization"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6060\" class=\"elementor elementor-6060\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa18013 e-flex e-con-boxed e-con e-parent\" data-id=\"fa18013\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9f6d137 e-con-full e-flex e-con e-child\" data-id=\"9f6d137\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd553b0 elementor-widget elementor-widget-ucaddon_square_icon_box\" data-id=\"dd553b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_square_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Icon Box -->\n\t\t<link id='font-awesome-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='uc_ac_assets_file_blox_boxed_small_square_icon_box_css_0-css' href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/ac_assets\/blox-boxed-small-square-icon-box\/blox-boxed-small-square-icon-box.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Icon Box *\/\n\n#uc_square_icon_box_elementor_dd553b0 * { \n\tbox-sizing: border-box; \n}\n\n#uc_square_icon_box_elementor_dd553b0{\n\tfont-family: inherit;\n    transition:0.3s;\n    position:relative;\n}\n\n#uc_square_icon_box_elementor_dd553b0 .blox-boxed-small-square-icon-box-icon{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(0deg);\n    z-index:2;\n}\n#uc_square_icon_box_elementor_dd553b0 .ue-icon {\n  display:inline-block;\n}\n#uc_square_icon_box_elementor_dd553b0 .blox-boxed-small-square-icon-box-icon > div{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(-0deg);\n}\n#uc_square_icon_box_elementor_dd553b0 .ue-icon-inner{\n    line-height:1em;\n\t} \t\n\n\n#uc_square_icon_box_elementor_dd553b0 .ue-icon-inner svg{\n    height:1em;\n    width:1em;\n\t} \t\n\t\n.blox-boxed-small-square-icon-box-heading{\n\tfont-size:21px;\n\t}\n\n\n#uc_square_icon_box_elementor_dd553b0:hover\n{\n  position:relative;\n  z-index:1;\n}\n\n\n#uc_square_icon_box_elementor_dd553b0 .ue_box_button\n{\n  text-align:center;\n  text-decoration:none;\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n#uc_square_icon_box_elementor_dd553b0 span.line\n{\n  display:block;\n  position:absolute;\n  top:0;\n  left:0;\n  width:0px;\n  transition:0.3s;\n}\n\n#uc_square_icon_box_elementor_dd553b0:hover span.line\n{\n  width:100%;\n}\n\n#uc_square_icon_box_elementor_dd553b0 .ue-title-separator span\n{\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n\n\n\n<\/style>\n\n<div class=\"square_icon_box \" id=\"uc_square_icon_box_elementor_dd553b0\">\n  \n  \t\t  \n  \n              <div class=\"ue-icon\">\n       <a style=\"display:inline-block; text-decoration:none;\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7313713\" >         <div class=\"blox-boxed-small-square-icon-box-icon\" style=\"background-color: ;\">\n           <div class=\"ue-icon-inner\"><i class='fas fa-book'><\/i><\/div>\n         <\/div>\n       <\/a>       <\/div>\n         \n  \t\t        <div class=\"blox-boxed-small-square-icon-box-heading\">\n        \tArticle\n        <\/div>\n          \n  \t\t  \n  \n          \n  \t\t        \n          \n  \t\t  \n<\/div>\n<!-- end Icon Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad5fbe9 elementor-widget elementor-widget-ucaddon_square_icon_box\" data-id=\"ad5fbe9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_square_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Icon Box -->\n\n<style>\/* widget: Icon Box *\/\n\n#uc_square_icon_box_elementor_ad5fbe9 * { \n\tbox-sizing: border-box; \n}\n\n#uc_square_icon_box_elementor_ad5fbe9{\n\tfont-family: inherit;\n    transition:0.3s;\n    position:relative;\n}\n\n#uc_square_icon_box_elementor_ad5fbe9 .blox-boxed-small-square-icon-box-icon{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(0deg);\n    z-index:2;\n}\n#uc_square_icon_box_elementor_ad5fbe9 .ue-icon {\n  display:inline-block;\n}\n#uc_square_icon_box_elementor_ad5fbe9 .blox-boxed-small-square-icon-box-icon > div{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(-0deg);\n}\n#uc_square_icon_box_elementor_ad5fbe9 .ue-icon-inner{\n    line-height:1em;\n\t} \t\n\n\n#uc_square_icon_box_elementor_ad5fbe9 .ue-icon-inner svg{\n    height:1em;\n    width:1em;\n\t} \t\n\t\n.blox-boxed-small-square-icon-box-heading{\n\tfont-size:21px;\n\t}\n\n\n#uc_square_icon_box_elementor_ad5fbe9:hover\n{\n  position:relative;\n  z-index:1;\n}\n\n\n#uc_square_icon_box_elementor_ad5fbe9 .ue_box_button\n{\n  text-align:center;\n  text-decoration:none;\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n#uc_square_icon_box_elementor_ad5fbe9 span.line\n{\n  display:block;\n  position:absolute;\n  top:0;\n  left:0;\n  width:0px;\n  transition:0.3s;\n}\n\n#uc_square_icon_box_elementor_ad5fbe9:hover span.line\n{\n  width:100%;\n}\n\n#uc_square_icon_box_elementor_ad5fbe9 .ue-title-separator span\n{\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n\n\n\n<\/style>\n\n<div class=\"square_icon_box \" id=\"uc_square_icon_box_elementor_ad5fbe9\">\n  \n  \t\t  \n  \n              <div class=\"ue-icon\">\n       <a style=\"display:inline-block; text-decoration:none;\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;#038;hl=sk&amp;#038;user=JXxir4oAAAAJ&amp;#038;cstart=20&amp;#038;pagesize=80&amp;#038;sortby=pubdate&amp;#038;citation_for_view=JXxir4oAAAAJ:5nxA0vEk-isC\" >         <div class=\"blox-boxed-small-square-icon-box-icon\" style=\"background-color: ;\">\n           <div class=\"ue-icon-inner\"><i class='fas fa-link'><\/i><\/div>\n         <\/div>\n       <\/a>       <\/div>\n         \n  \t\t        <div class=\"blox-boxed-small-square-icon-box-heading\">\n        \tLink to Google Scholar\n        <\/div>\n          \n  \t\t  \n  \n          \n  \t\t        \n          \n  \t\t  \n<\/div>\n<!-- end Icon Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e851db elementor-widget elementor-widget-text-editor\" data-id=\"8e851db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Authors: <\/b>Pavol Sokol, Lenka Kleinov\u00e1, Martin Hus\u00e1k<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79e945b elementor-widget elementor-widget-heading\" data-id=\"79e945b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b77c4c2 elementor-widget elementor-widget-text-editor\" data-id=\"b77c4c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Honeypots and honeynets are unconventional security tools to study techniques, methods, tools, and goals of attackers. Analysis of data collected by these security tools is important for network security. In this paper, authors focus on time-oriented data as well as they outline visualization of this kind of data in honeypots and honeynets. Authors also provide results from honeynet based on special visualization &#8211; heatmaps.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5a0a23 elementor-widget elementor-widget-heading\" data-id=\"e5a0a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Introduction<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-413ae1c elementor-widget elementor-widget-text-editor\" data-id=\"413ae1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Due to the rapid growth in amount of information and transfer of messages, network security has become an increasingly important part of modern society. Traditionally, information security is primarily defensive and uses tools such as firewalls and intrusion detection systems to protect the information. The attackers are several steps ahead of defensive mechanisms. From this perspective, it is necessary to find new approaches to protect information and infrastructure of the organizations. Effective approaches to protect them can be obtained via analysis of honeypots and honeynets.<\/p><p>A\u00a0<b>honeypot<\/b>\u00a0is \u201ca computing resource, whose value is in being attacked\u201d\u00a0<a id=\"context_ref_1_1\" data-range=\"ref1\"><\/a>[1]. Lance Spitzner defines honeypots as \u201can information system resource whose value lies in unauthorized or illicit use of that resource\u201d\u00a0<a id=\"context_ref_2_1\" data-range=\"ref2\"><\/a>[2]. Honeypots are very useful tools for learning about attackers and their objectives, methods and tools.<\/p><p>The honeypots can be classified by several aspects. According to their role, there are two types of honeypots &#8211; client-side and server-side honeypots. The main role of client-side honeypots is \u201cto identify and detect malicious activities across the Internet\u201d\u00a0<a id=\"context_ref_3_1\" data-range=\"ref3\"><\/a>[3]. For example Thug\u00a0<a id=\"context_ref_4_1\" data-range=\"ref4\"><\/a>[4]. On the other hand, server-side honeypots are useful in detecting new exploits, collecting malware, and enriching research of threat analysis, e.g., Conpot\u00a0<a id=\"context_ref_5_1\" data-range=\"ref5\"><\/a>[5].<\/p><p>Another classification of honeypot is by\u00a0<b>level of interaction<\/b>. The level of interaction can be defined as the range of possibilities the attacker is given after penetrating the system. Low-interaction honeypot emulates service, or couple of services, but it does not provide complete operating system. Examples of this type of honeypots are Dionaea\u00a0<a id=\"context_ref_6_1\" data-range=\"ref6\"><\/a>[6]\u00a0and HoneyD\u00a0<a id=\"context_ref_7_1\" data-range=\"ref7\"><\/a>[7]. In order to get more information about attackers, their methods and attacks, a complete operating system with all services is used. This type of honeypot is referred as high-interaction honeypot. Main aim of this type of honeypot is to provide the attacker access to a real operating system, where nothing is emulated or restricted\u00a0<a id=\"context_ref_1_1\" data-range=\"ref1\"><\/a>[1]. Examples of this type of honeypots are Sebek\u00a0<a id=\"context_ref_8_1\" data-range=\"ref8\"><\/a>[8]\u00a0and HonSSH\u00a0<a id=\"context_ref_9_1\" data-range=\"ref9\"><\/a>[9].<\/p><p><b>Honeynet<\/b>\u00a0extends \u201cthe concept of a single honeypot to a highly controlled network of honeypots\u201d\u00a0<a id=\"context_ref_10_1\" data-range=\"ref10\"><\/a>[10]. However, there is \u201cno single rule on how one should deploy this architecture\u201d\u00a0<a id=\"context_ref_11_1\" data-range=\"ref11\"><\/a>[11]. There are three core parts of the honeynet architecture that define honeynet architecture\u00a0<a id=\"context_ref_2_1\" data-range=\"ref2\"><\/a>[2],\u00a0<a id=\"context_ref_11_1\" data-range=\"ref11\"><\/a>[11]:<\/p><ul><li><p><b>Data capture<\/b>\u00a0&#8211; monitors and logs all activities of attacker within the honeynet.<\/p><\/li><li><p><b>Data control<\/b>\u00a0&#8211; purpose is to control the activity of attacker.<\/p><\/li><li><p><b>Data collection<\/b>\u00a0&#8211; all data are captured and stored in one central location.<\/p><\/li><\/ul><p>\u00a0<\/p><p>The first two parts are the most important, and they are applicable to every honeynet deployment. The last part &#8211; data collection &#8211; is applied by organization in case that organization has multiple honeynets in distributed environments.<\/p><p>Some authors, e.g., Shi-wei\u00a0<a id=\"context_ref_12_1\" data-range=\"ref12\"><\/a>[12]\u00a0and Rammidi\u00a0<a id=\"context_ref_13_1\" data-range=\"ref13\"><\/a>[13], add\u00a0<b>data analysis<\/b>\u00a0to the above-mentioned core parts. Data analysis is an ability of honeynet to analyse the data, which are being collected from it. Data analysis is used for \u201cunderstanding, analysing, and tracking the captured probes, attacks or some other malicious activities\u201d\u00a0<a id=\"context_ref_1_1\" data-range=\"ref1\"><\/a>[1].<\/p><p>Collection of data from honeypots and honeynets and subsequent analysis of these data is the main purpose of using these tools. Learning new unconventional information about the attackers and their methods helps with protection of the organizations.<\/p><p>The main aim of this paper is to obtain information about attackers using\u00a0<b>visualization and analysis of time-oriented data (temporal data<\/b>). By the term time-oriented data we mean the data that are in some way connected to time. More precisely, they are data values that are associated with time primitives\u00a0<a id=\"context_ref_14_1\" data-range=\"ref14\"><\/a>[14].<\/p><p>Honeypots and honeynets capture a number of different data. Each record collected by honeypots contains at least the following data:<\/p><ul><li><p>timestamp,<\/p><\/li><li><p>service,<\/p><\/li><li><p><b>IP<\/b>\u00a0address of honeypot, and<\/p><\/li><li><p><b>IP<\/b>\u00a0address of attacker.<\/p><\/li><\/ul><p>\u00a0<\/p><p>Timestamps are important collected data.\u00a0<b>Timestamp<\/b>\u00a0can be defined as, an unambiguous representation of some instant in time\u201d\u00a0<a id=\"context_ref_15_1\" data-range=\"ref15\"><\/a>[15]. Each honeypot adds a timestamp to each record. Therefore, data collected by honeypots can be considered the time-oriented data. From timestamp the units or periods of time can be obtained. Later in this paper, analysis of data collected over one year is presented. Therefore, month, week, day, day of the week, and hour are used as criteria for time-oriented analysis. The following information can be obtained from these data:<\/p><ul><li><p>information about time of the attack in terms of the objective of the attack &#8211; honeynets and source of the attack (using time zones).<\/p><\/li><li><p>information about the progress of the attack against honeynet for a time period,<\/p><\/li><li><p>information about number of attacks against honeynet considering the time aspect &#8211; day, hour or month.<\/p><\/li><\/ul><p>\u00a0<\/p><p>To formalize the scope of our work, authors state\u00a0<b>three research questions<\/b>:<\/p><ul><li><p>At what time do the attacks occur?<\/p><\/li><li><p>On which day of the month and day of the week do the attackers attack?<\/p><\/li><li><p>From which time zones do the attackers attack?<\/p><\/li><\/ul><p>\u00a0<\/p><p>This paper is organized into six sections. In\u00a0<a class=\"fulltext-link\">Section II<\/a>\u00a0paper focuses on the papers related to visualization and analysis in the honeypots and honeynets.\u00a0<a class=\"fulltext-link\">Section III<\/a>\u00a0outlines the dataset and research method for experiment. In\u00a0<a class=\"fulltext-link\">Sections IV<\/a>\u00a0and\u00a0<a class=\"fulltext-link\">V<\/a>\u00a0there are lessons learned by time-oriented visualization. The last Section contains conclusions and author&#8217;s suggestions on the future research.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Authors: Pavol Sokol, Patrik Pekar\u010d\u00edk, Tom\u00e1\u0161 Bajto\u0161<\/p>","protected":false},"author":9,"featured_media":5713,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"full-width","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[15],"tags":[],"class_list":["post-6060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-clanky","entry","has-media"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/6060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=6060"}],"version-history":[{"count":6,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/6060\/revisions"}],"predecessor-version":[{"id":8857,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/6060\/revisions\/8857"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media\/5713"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=6060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/categories?post=6060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/tags?post=6060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}