{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:09:36Z","timestamp":1772122176567,"version":"3.50.1"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030015534","type":"print"},{"value":"9783030015541","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01554-1_19","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T15:47:56Z","timestamp":1537890476000},"page":"326-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud"],"prefix":"10.1007","author":[{"given":"Sailik","family":"Sengupta","sequence":"first","affiliation":[]},{"given":"Ankur","family":"Chowdhary","sequence":"additional","affiliation":[]},{"given":"Dijiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Subbarao","family":"Kambhampati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"issue":"1","key":"19_CR1","first-page":"1","volume":"6","author":"O Al-Jarrah","year":"2015","unstructured":"Al-Jarrah, O., Arafat, A.: Network intrusion detection system using neural network classification of attack behavior. J. Adv. Inf. Technol. 6(1), 1\u20136 (2015)","journal-title":"J. Adv. Inf. Technol."},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Bakshi, A., Dujodwala, Y.B.: Securing cloud from DDOS attacks using intrusion detection system in virtual machine. In: Second International Conference on Communication Software and Networks, ICCSN 2010, pp. 260\u2013264. IEEE (2010)","DOI":"10.1109\/ICCSN.2010.56"},{"key":"19_CR3","unstructured":"Brown, D.J., Suckow, B., Wang, T.: A survey of intrusion detection systems. Department of Computer Science, University of California, San Diego (2002)"},{"issue":"2","key":"19_CR4","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1257\/aer.103.2.585","volume":"103","author":"E Budish","year":"2013","unstructured":"Budish, E., Che, Y.K., Kojima, F., Milgrom, P.: Designing random allocation mechanisms: theory and applications. Am. Econ. Rev. 103(2), 585\u2013623 (2013)","journal-title":"Am. Econ. Rev."},{"key":"19_CR5","unstructured":"M. I. Center: APT1: Exposing One of Chinas Cyber Espionage Units. Mandian.com (2013)"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, pp. 647\u2013651. IEEE (2012)","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Chowdhary, A., Alshamrani, A., Huang, D., Liang, H.: MTD analysis and evaluation framework in software defined network (MASON). In: Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, pp. 43\u201348. ACM (2018)","DOI":"10.1145\/3180465.3180473"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Chowdhary, A., Pisharody, S., Huang, D.: SDN based scalable MTD solution in cloud network. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense, pp. 27\u201336. ACM (2016)","DOI":"10.1145\/2995272.2995274"},{"issue":"4","key":"19_CR9","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TDSC.2013.8","volume":"10","author":"CJ Chung","year":"2013","unstructured":"Chung, C.J., Khatkar, P., Xing, T., Lee, J., Huang, D.: NICE: network intrusion detection and countermeasure selection in virtual network systems. IEEE Trans. Dependable Secure Comput. 10(4), 198\u2013211 (2013)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Conitzer, V., Sandholm, T.: Computing the optimal strategy to commit to. In: Proceedings of the 7th ACM Conference on Electronic Commerce, pp. 82\u201390. ACM (2006)","DOI":"10.1145\/1134707.1134717"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Dastjerdi, A.V., Bakar, K.A., Tabatabaei, S.G.H.: Distributed intrusion detection in clouds using mobile agents. In: Third International Conference on Advanced Engineering Computing and Applications in Sciences, ADVCOMP 2009, pp. 175\u2013180. IEEE (2009)","DOI":"10.1109\/ADVCOMP.2009.34"},{"issue":"8","key":"19_CR12","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/S1389-1286(98)00017-6","volume":"31","author":"H Debar","year":"1999","unstructured":"Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Comput. Netw. 31(8), 805\u2013822 (1999)","journal-title":"Comput. Netw."},{"key":"19_CR13","first-page":"1","volume":"9","author":"P Deshpande","year":"2014","unstructured":"Deshpande, P., Sharma, S., Peddoju, S., Junaid, S.: HIDS: a host based intrusion detection system for cloud computing environment. Int. J. Syst. Assur. Eng. Manag. 9, 1\u201310 (2014)","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"19_CR14","unstructured":"Durkota, K., Lis\u1ef3, V., Bosansk\u1ef3, B., Kiekintveld, C.: Optimal network security hardening using attack graph games. In: IJCAI, pp. 526\u2013532 (2015)"},{"key":"19_CR15","unstructured":"Garfinkel, T., Rosenblum, M., et al.: A virtual machine introspection based architecture for intrusion detection. In: NDSS, vol. 3, pp. 191\u2013206 (2003)"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Hu, Z., Zhu, M., Liu, P.: Online algorithms for adaptive cyber defense on Bayesian attack graphs (2017)","DOI":"10.1145\/3140549.3140556"},{"issue":"4","key":"19_CR17","first-page":"457","volume":"5","author":"LM Ibrahim","year":"2010","unstructured":"Ibrahim, L.M.: Anomaly network intrusion detection system based on distributed time-delay neural network (DTDNN). J. Eng. Sci. Technol. 5(4), 457\u2013471 (2010)","journal-title":"J. Eng. Sci. Technol."},{"key":"19_CR18","unstructured":"Ilgun, K.: USTAT: a real-time intrusion detection system for UNIX. University of California Santa Barbara Master thesis (1992)"},{"issue":"3","key":"19_CR19","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/3137571","volume":"18","author":"S Jajodia","year":"2018","unstructured":"Jajodia, S., Park, N., Serra, E., Subrahmanian, V.: Share: a stackelberg honey-based adversarial reasoning engine. ACM Trans. Internet Technol. (TOIT) 18(3), 30 (2018)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"19_CR20","unstructured":"Jha, S., Sheyner, O., Wing, J.: Two formal analyses of attack graphs. In: Proceedings of 15th IEEE Computer Security Foundations Workshop, pp. 49\u201363. IEEE (2002)"},{"issue":"4","key":"19_CR21","first-page":"33","volume":"11","author":"S Jo","year":"2015","unstructured":"Jo, S., Sung, H., Ahn, B.: A comparative study on the performance of intrusion detection using decision tree and artificial neural network models. J. Korea Soc. Digit. Ind. Inf. Manag. 11(4), 33\u201345 (2015)","journal-title":"J. Korea Soc. Digit. Ind. Inf. Manag."},{"key":"19_CR22","unstructured":"Jones, S., et al.: Evaluating moving target defense with PLADD. Technical report, Sandia National Labs-NM, Albuquerque (2015)"},{"key":"19_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/978-3-642-15497-3_38","volume-title":"Computer Security \u2013 ESORICS 2010","author":"N Kheir","year":"2010","unstructured":"Kheir, N., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: A service dependency model for cost-sensitive intrusion response. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 626\u2013642. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15497-3_38"},{"key":"19_CR24","unstructured":"Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Ord\u00f3\u00f1ez, F., Tambe, M.: Computing optimal randomized resource allocations for massive security games. In: Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, pp. 689\u2013696. International Foundation for Autonomous Agents and Multiagent Systems (2009)"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Korzhyk, D., Conitzer, V., Parr, R.: Complexity of computing optimal stackelberg strategies in security resource allocation games. In: AAAI (2010)","DOI":"10.1609\/aaai.v24i1.7638"},{"key":"19_CR26","unstructured":"Letchford, J., Vorobeychik, Y.: Optimal interdiction of attack plans. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems, pp. 199\u2013206. International Foundation for Autonomous Agents and Multiagent Systems (2013)"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Maleki, H., Valizadeh, S., Koch, W., Bestavros, A., van Dijk, M.: Markov modeling of moving target defense games. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense, pp. 81\u201392. ACM (2016)","DOI":"10.1145\/2995272.2995273"},{"issue":"6","key":"19_CR28","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MSP.2006.145","volume":"4","author":"P Mell","year":"2006","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: Common vulnerability scoring system. IEEE Secur. Priv. 4(6), 85\u201389 (2006)","journal-title":"IEEE Secur. Priv."},{"key":"19_CR29","unstructured":"Panda, S., Vorobeychik, Y.: Near-optimal interdiction of factored MDPs. In: Conference on Uncertainty in Artificial Intelligence (2017)"},{"key":"19_CR30","unstructured":"Paruchuri, P., Pearce, J.P., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing games for security: an efficient exact algorithm for solving Bayesian stackelberg games. In: Proceedings of the 7th International Joint Conference on Autonomous agents and Multiagent Systems, vol. 2, pp. 895\u2013902. International Foundation for Autonomous Agents and Multiagent Systems (2008)"},{"key":"19_CR31","unstructured":"Pita, J., et al.: Deployed armor protection: the application of a game theoretic model for security at the los angeles international airport. In: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems: Industrial Track, pp. 125\u2013132. AAMAS (2008)"},{"key":"19_CR32","unstructured":"Roesch, M., et al.: Snort: lightweight intrusion detection for networks. In: LISA 1999, pp. 229\u2013238 (1999)"},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"Roschke, S., Cheng, F., Meinel, C.: An extensible and virtualization-compatible ids management architecture. In: Fifth International Conference on Information Assurance and Security, IAS 2009, vol. 2, pp. 130\u2013134. IEEE (2009)","DOI":"10.1109\/IAS.2009.151"},{"key":"19_CR34","unstructured":"Rowland, C.H.: Intrusion detection system. US Patent 6,405,318, 11 June 2002"},{"key":"19_CR35","unstructured":"Sengupta, S., Chakraborti, T., Kambhampati, S.: MTDeep: boosting the security of deep neural nets against adversarial attacks with moving target defense. arXiv preprint arXiv:1705.07213 (2017)"},{"key":"19_CR36","unstructured":"Sengupta, S., et al.: A game theoretic approach to strategy generation for moving target defense in web applications. In: Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, pp. 178\u2013186. International Foundation for Autonomous Agents and Multiagent Systems (2017)"},{"issue":"1","key":"19_CR37","first-page":"19","volume":"1","author":"A Sinha","year":"2015","unstructured":"Sinha, A., Nguyen, T.H., Kar, D., Brown, M., Tambe, M., Jiang, A.X.: From physical security to cybersecurity. J. Cybersecur. 1(1), 19\u201335 (2015)","journal-title":"J. Cybersecur."},{"issue":"8","key":"19_CR38","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/S1353-4858(11)70086-1","volume":"2011","author":"C Tankard","year":"2011","unstructured":"Tankard, C.: Advanced persistent threats and how to monitor and deter them. Netw. Secur. 2011(8), 16\u201319 (2011)","journal-title":"Netw. Secur."},{"key":"19_CR39","unstructured":"Vadlamudi, S.G., et al.: Moving target defense for web applications using Bayesian stackelberg games. In: Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems, pp. 1377\u20131378. International Foundation for Autonomous Agents and Multiagent Systems (2016)"},{"issue":"4","key":"19_CR40","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/s00145-012-9134-5","volume":"26","author":"M Van Dijk","year":"2013","unstructured":"Van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: Flipit: The game of \u201cstealthy takeover\u201d. J. Cryptol. 26(4), 655\u2013713 (2013)","journal-title":"J. Cryptol."},{"key":"19_CR41","doi-asserted-by":"crossref","unstructured":"Venkatesan, S., Albanese, M., Amin, K., Jajodia, S., Wright, M.: A moving target defense approach to mitigate DDOS attacks against proxy-based architectures. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 198\u2013206. IEEE (2016)","DOI":"10.1109\/CNS.2016.7860486"},{"key":"19_CR42","doi-asserted-by":"crossref","unstructured":"Venkatesan, S., Albanese, M., Cybenko, G., Jajodia, S.: A moving target defense approach to disrupting stealthy botnets. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense, pp. 37\u201346. ACM (2016)","DOI":"10.1145\/2995272.2995280"},{"issue":"4","key":"19_CR43","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MITP.2009.89","volume":"12","author":"K Vieira","year":"2010","unstructured":"Vieira, K., Schulter, A., Westphall, C., Westphall, C.: Intrusion detection for grid and cloud computing. IT Prof. 12(4), 38\u201343 (2010)","journal-title":"IT Prof."},{"key":"19_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-319-02786-9_15","volume-title":"Decision and Game Theory for Security","author":"Q Zhu","year":"2013","unstructured":"Zhu, Q., Ba\u015far, T.: Game-theoretic approach to feedback-driven multi-stage moving target defense. In: Das, S.K., Nita-Rotaru, C., Kantarcioglu, M. (eds.) GameSec 2013. LNCS, vol. 8252, pp. 246\u2013263. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-02786-9_15"},{"key":"19_CR45","doi-asserted-by":"crossref","unstructured":"Zhuang, R., DeLoach, S.A., Ou, X.: Towards a theory of moving target defense. In: Proceedings of the First ACM Workshop on Moving Target Defense, pp. 31\u201340. ACM (2014)","DOI":"10.1145\/2663474.2663479"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01554-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:54:47Z","timestamp":1709823287000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-01554-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030015534","9783030015541"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01554-1_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"26 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Decision and Game Theory for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seattle, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.gamesec-conf.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Three of the full papers and two of the short papers were submitted to a special track on Adversarial AI.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}