{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:52:27Z","timestamp":1726037547127},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_48","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:19:24Z","timestamp":1563391164000},"page":"541-550","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Method to Defense APT Based on Dynamic ID Transformation"],"prefix":"10.1007","author":[{"given":"Delei","family":"Nie","sequence":"first","affiliation":[]},{"given":"Hong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xiaobin","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"48_CR1","doi-asserted-by":"crossref","unstructured":"Jafarian, J.H., Al-Shaer, E., Duan, Q.: Spatiotemporal address mutation for proactive cyber agility against sophisticated attackers. In: First ACM Workshop on Moving Target Defense, MTD 2014 (2014)","DOI":"10.1145\/2663474.2663483"},{"issue":"12","key":"48_CR2","doi-asserted-by":"publisher","first-page":"3471","DOI":"10.1016\/j.comnet.2007.02.006","volume":"51","author":"S Antonatos","year":"2007","unstructured":"Antonatos, S., Akritidis, P., Markatos, E.P., et al.: Defending against Hitlist worms using network address space randomization. Comput. Netw. 51(12), 3471\u20133490 (2007)","journal-title":"Comput. Netw."},{"key":"48_CR3","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-1-4614-0977-9_9","volume-title":"Moving Target Defense","author":"E Al-Shaer","year":"2011","unstructured":"Al-Shaer, E.: Toward network configuration randomization for moving target defense. In: Jajodia, S., Ghosh, A., Swarup, V., Wang, C., Wang, X. (eds.) Moving Target Defense. Advances in Information Security, vol. 54, pp. 153\u2013159. Springer, New York (2011). \n                      https:\/\/doi.org\/10.1007\/978-1-4614-0977-9_9"},{"key":"48_CR4","unstructured":"Rowe, J., Levitt, K.N., Demi, T., et al.: Artificial diversity as maneuvers in a control theoretic moving target defense. In: National Symposium on Moving Target Research (2012)"},{"key":"48_CR5","unstructured":"Kewley, D., Fink, R., Lowry, J., et al.: Dynamic approaches to thwart adversary intelligence gathering. In: Proceedings of DARPA Information Survivability Conference & amp; Exposition II, DISCEX 2001, pp. 176\u2013185. IEEE (2001)"},{"key":"48_CR6","volume-title":"SDN: Software Defined Networks","author":"TD Nadeau","year":"2013","unstructured":"Nadeau, T.D., Gray, K.: SDN: Software Defined Networks. O\u2019REILLY Media Inc., USA (2013)"},{"key":"48_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-642-40203-6_14","volume-title":"Computer Security \u2013 ESORICS 2013","author":"JH Jafarian","year":"2013","unstructured":"Jafarian, J.H., Al-Shaer, E., Duan, Q.: Formal approach for route agility against persistent attackers. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 237\u2013254. Springer, Heidelberg (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-642-40203-6_14"},{"key":"48_CR8","unstructured":"Atighetchi, M., Pal, P., Webber, F., et al.: Adaptive use of network-centric mechanisms in cyber-defense. In: Second IEEE International Symposium on Network Computing and Applications, NCA 2003, pp. 179\u2013188. IEEE (2003)"},{"key":"48_CR9","unstructured":"Kewley, D., Fink, R., Lowry, J., et al.: Dynamic approaches to thwart adversary intelligence gathering. In: DARPA Information Survivability Conference & Exposition II, DISCEX 2001, pp. 176\u2013185. IEEE (2001)"},{"key":"48_CR10","unstructured":"Bj\u00f8rner, N., de Moura, L.: Z310: applications, enablers, challenges and directions. In: CFV 2009 (2009)"},{"issue":"3","key":"48_CR11","first-page":"447","volume":"55","author":"M Wan","year":"2018","unstructured":"Wan, M., Yao, J., Jing, Y., Jin, X.: Event-based anomaly detection for non-public industrial communication protocols in SDN-based control systems. CMC: Comput. Mater. Continua 55(3), 447\u2013463 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"key":"48_CR12","doi-asserted-by":"crossref","unstructured":"Kampanakis, P., Perros, H., Beyene, T.: SDN-based solutions for moving target defense network protection. In: World of Wireless, Mobile and Multimedia Networks, pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/WoWMoM.2014.6918979"},{"key":"48_CR13","doi-asserted-by":"crossref","unstructured":"Macfarland, D.C., Shue, C.A.: The SDN shuffle: creating a moving-target defense using host-based software-defined networking. In: ACM Workshop on Moving Target Defense, pp. 37\u201341. ACM (2015)","DOI":"10.1145\/2808475.2808485"},{"key":"48_CR14","doi-asserted-by":"crossref","unstructured":"Chowdhary, A., Pisharodym, S., Huangm, D.: SDN based scalable MTD solution in cloud network. In: ACM Workshop on Moving Target Defense, pp. 27\u201336. ACM (2016)","DOI":"10.1145\/2995272.2995274"},{"issue":"99","key":"48_CR15","first-page":"1","volume":"PP","author":"C Lei","year":"2017","unstructured":"Lei, C., Ma, D.H., Zhang, H.Q.: Optimal strategy selection for moving target defense based on Markov game. IEEE Access PP(99), 1 (2017)","journal-title":"IEEE Access"},{"key":"48_CR16","doi-asserted-by":"crossref","unstructured":"Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: Proceedings of the First Workshop on Hot Topics in Software Defined Network, HotSDN 2012, pp. 127\u2013132. ACM (2012)","DOI":"10.1145\/2342441.2342467"},{"key":"48_CR17","doi-asserted-by":"crossref","unstructured":"Dunlop, M., Groat, S., Marchany, R., Tront, J.: Implementing an IPv6 moving target defense on a live network. In: National Symposium on Moving Target Research, June 2012","DOI":"10.1109\/MILCOM.2011.6127486"},{"key":"48_CR18","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E., Jafarian, J.: On the random route mutation moving target defense. In: National Symposium on Moving Target Research, June 2012","DOI":"10.1145\/2342441.2342467"},{"issue":"7","key":"48_CR19","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/TMC.2010.36","volume":"9","author":"T Shu","year":"2010","unstructured":"Shu, T., Krunz, M., Liu, S.: Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mob. Comput. 9(7), 941\u2013954 (2010)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"3","key":"48_CR20","first-page":"523","volume":"55","author":"L Xiong","year":"2018","unstructured":"Xiong, L., Shi, Y.: On the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing. CMC: Comput. Mater. Continua 55(3), 523\u2013539 (2018)","journal-title":"CMC: Comput. Mater. Continua"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:37:42Z","timestamp":1563392262000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}