{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:03:40Z","timestamp":1775261020098,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030036379","type":"print"},{"value":"9783030036386","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03638-6_15","type":"book-chapter","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T03:12:53Z","timestamp":1541041973000},"page":"236-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Attack Simulation for a Realistic Evaluation and Comparison of Network Security Techniques"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Bajic","sequence":"first","affiliation":[]},{"given":"Georg T.","family":"Becker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,2]]},"reference":[{"key":"15_CR1","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-3-642-36883-7_19","volume-title":"Security and Privacy in Communication Networks","author":"E Al-Shaer","year":"2013","unstructured":"Al-Shaer, E., Duan, Q., Jafarian, J.H.: Random host mutation for moving target defense. In: Keromytis, A.D., Di Pietro, R. (eds.) SecureComm 2012. LNICST, vol. 106, pp. 310\u2013327. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36883-7_19"},{"issue":"6","key":"15_CR2","doi-asserted-by":"publisher","first-page":"1361","DOI":"10.1109\/TIFS.2017.2779436","volume":"13","author":"HMJ Almohri","year":"2018","unstructured":"Almohri, H.M.J., Watson, L.T., Evans, D.: Misery digraphs: delaying intrusion attacks in obscure clouds. IEEE Trans. Inf. Forensics Secur. 13(6), 1361\u20131375 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Anderson, N., Mitchell, R., Chen, I.R.: Parameterizing moving target defenses. In: 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20136, November 2016","DOI":"10.1109\/NTMS.2016.7792466"},{"key":"15_CR4","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-319-58469-0_9","volume-title":"ICT Systems Security and Privacy Protection","author":"W Connell","year":"2017","unstructured":"Connell, W., Albanese, M., Venkatesan, S.: A framework for moving target defense quantification. In: De Capitani di Vimercati, S., Martinelli, F. (eds.) SEC 2017. IFIP AICT, vol. 502, pp. 124\u2013138. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58469-0_9"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Connell, W., Menasc\u00e9, D.A., Albanese, M.: Performance modeling of moving target defenses. In: Proceedings of the 2017 Workshop on Moving Target Defense, MTD 2017, pp. 53\u201363. ACM, New York (2017)","DOI":"10.1145\/3140549.3140550"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Dunlop, M., Groat, S., Urbanski, W., Marchany, R., Tront, J.: MT6D: a moving target IPv6 defense. In: Military Communications Conference - MILCOM 2011, pp. 1321\u20131326, November 2011","DOI":"10.1109\/MILCOM.2011.6127486"},{"key":"15_CR7","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-1-4614-0977-9_2","volume-title":"Moving Target Defense","author":"D Evans","year":"2011","unstructured":"Evans, D., Nguyen-Tuong, A., Knight, J.: Effectiveness of moving target defenses. In: Jajodia, S., Ghosh, A., Swarup, V., Wang, C., Wang, X. (eds.) Moving Target Defense. Advances in Information Security, vol. 54, pp. 29\u201348. Springer, New York (2011). https:\/\/doi.org\/10.1007\/978-1-4614-0977-9_2"},{"issue":"6","key":"15_CR8","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1109\/TDSC.2014.2382574","volume":"12","author":"H Holm","year":"2015","unstructured":"Holm, H., Shahzad, K., Buschle, M., Ekstedt, M.: P$$^{2}$$CySeMoL: predictive, probabilistic cyber security modeling language. IEEE Trans. Dependable Secur. Comput. 12(6), 626\u2013639 (2015)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Holm, H., Sommestad, T., Ekstedt, M., Nordstr\u00f6m, L.: CySeMoL: A tool for cyber security analysis of enterprises. In: 22nd International Conference and Exhibition on Electricity Distribution (CIRED 2013), pp. 1\u20134, June 2013","DOI":"10.1049\/cp.2013.1077"},{"issue":"2","key":"15_CR10","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TDSC.2015.2443790","volume":"13","author":"JB Hong","year":"2016","unstructured":"Hong, J.B., Kim, D.S.: Assessing the effectiveness of moving target defenses using security models. IEEE Trans. Dependable Secur. Comput. 13(2), 163\u2013177 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Noel, S., Kalapa, P., Albanese, M., Williams, J.: Cauldron mission-centric cyber situational awareness with defense in depth. In: Military Communications Conference - MILCOM 2011, pp. 1339\u20131344 (2011)","DOI":"10.1109\/MILCOM.2011.6127490"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/0-387-24230-9_9","volume-title":"Managing Cyber Threats. Massive Computing","author":"S Jajodia","year":"2005","unstructured":"Jajodia, S., Noel, S., O\u2019Berry, B.: Topological analysis of network attack vulnerability. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats. Massive Computing, vol. 5, pp. 247\u2013266. Springer, Boston (2005). https:\/\/doi.org\/10.1007\/0-387-24230-9_9"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Johnson, P., Vernotte, A., Ekstedt, M., Lagerstr\u00f6m, R.: pwnPr3d: an attack-graph-driven probabilistic threat-modeling approach. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 278\u2013283. IEEE (2016)","DOI":"10.1109\/ARES.2016.77"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Kampanakis, P., Perros, H., Beyene, T.: SDN-based solutions for moving target defense network protection. In: Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 1\u20136, June 2014","DOI":"10.1109\/WoWMoM.2014.6918979"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Kewley, D., Fink, R., Lowry, J., Dean, M.: Dynamic approaches to thwart adversary intelligence gathering. In: Proceedings of the DARPA Information Survivability Conference and Exposition II, DISCEX 2001, vol. 1, pp. 176\u2013185 (2001)","DOI":"10.1109\/DISCEX.2001.932214"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Li, J., Yackoski, J., Evancich, N.: Moving target defense: a journey from idea to product. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense, MTD 2016, pp. 69\u201379. ACM (2016)","DOI":"10.1145\/2995272.2995286"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"MacFarland, D.C., Shue, C.A.: The SDN shuffle: creating a moving-target defense using host-based software-defined networking. In: Proceedings of the Second ACM Workshop on Moving Target Defense, MTD 2015, pp. 37\u201341. ACM (2015)","DOI":"10.1145\/2808475.2808485"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Maleki, H., Valizadeh, S., Koch, W., Bestavros, A., van Dijk, M.: Markov modeling of moving target defense games. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense, MTD 2016, pp. 81\u201392. ACM (2016)","DOI":"10.1145\/2995272.2995273"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Neupane, R.L., et al.: Dolus: cyber defense using pretense against DDoS attacks in cloud platforms. In: Proceedings of the 19th International Conference on Distributed Computing and Networking, ICDCN 2018, pp. 30:1\u201330:10. ACM (2018)","DOI":"10.1145\/3154273.3154346"},{"key":"15_CR20","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: a logic-based network security analyzer. In: USENIX Security Symposium, Baltimore, MD, p. 8 (2005)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Prakash, A., Wellman, M.P.: Empirical game-theoretic analysis for moving target defense. In: Proceedings of the Second ACM Workshop on Moving Target Defense, MTD 2015, pp. 57\u201365. ACM, New York (2015)","DOI":"10.1145\/2808475.2808483"},{"issue":"5\u20136","key":"15_CR22","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1177\/0037549709340730","volume":"86","author":"S Schmidt","year":"2010","unstructured":"Schmidt, S., Bye, R., Chinnow, J., Bsufka, K., Camtepe, A., Albayrak, S.: Application-level simulation for network security. Simulation 86(5\u20136), 311\u2013330 (2010)","journal-title":"Simulation"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Taylor, J., Zaffarano, K., Koller, B., Bancroft, C., Syversen, J.: Automated effectiveness evaluation of moving target defenses: metrics for missions and attacks. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense, MTD 2016, pp. 129\u2013134. ACM, New York (2016)","DOI":"10.1145\/2995272.2995282"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Vadlamudi, S.G., et al.: Moving target defense for web applications using Bayesian Stackelberg games: (extended abstract). In: Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2016, pp. 1377\u20131378 (2016)","DOI":"10.65109\/GSCT7066"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Venkatesan, S., Albanese, M., Cybenko, G., Jajodia, S.: A moving target defense approach to disrupting stealthy botnets. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense, MTD 2016, pp. 37\u201346. ACM (2016)","DOI":"10.1145\/2995272.2995280"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Vernotte, A., Johnson, P., Ekstedt, M., Lagerstrm, R.: In-depth modeling of the UNIX operating system for architectural cyber security analysis. In: 2017 IEEE 21st International Enterprise Distributed Object Computing Workshop (EDOCW), pp. 127\u2013136, October 2017","DOI":"10.1109\/EDOCW.2017.26"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Wang, H., Li, F., Chen, S.: Towards cost-effective moving target defense against DDoS and covert channel attacks. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense, MTD 2016, pp. 15\u201325. ACM, New York (2016)","DOI":"10.1145\/2995272.2995281"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Zaffarano, K., Taylor, J., Hamilton, S.: A quantitative framework for moving target defense effectiveness evaluation. In: Proceedings of the Second ACM Workshop on Moving Target Defense, MTD 2015, pp. 3\u201310. ACM (2015)","DOI":"10.1145\/2808475.2808476"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Zhuang, R., DeLoach, S.A., Ou, X.: A model for analyzing the effect of moving target defenses on enterprise networks. In: Proceedings of the 9th Annual Cyber and Information Security Research Conference, CISR 2014, pp. 73\u201376. ACM, New York (2014)","DOI":"10.1145\/2602087.2602088"},{"key":"15_CR30","unstructured":"Zhuang, R., Zhang, S., DeLoach, S.A., Ou, X., Singhal, A.: Simulation-based approaches to studying effectiveness of moving-target network defense. In: National Symposium on Moving Target Research. NIST (2012)"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03638-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:48:48Z","timestamp":1775256528000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03638-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030036379","9783030036386"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03638-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"NordSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nordic Conference on Secure IT Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nordsec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securitylab.no\/nordsec18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}