{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:31:22Z","timestamp":1759091482593},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030324292"},{"type":"electronic","value":"9783030324308"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32430-8_29","type":"book-chapter","created":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T15:11:01Z","timestamp":1572016261000},"page":"492-512","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["General Sum Markov Games for Strategic Detection of Advanced Persistent Threats Using Moving Target Defense in Cloud Networks"],"prefix":"10.1007","author":[{"given":"Sailik","family":"Sengupta","sequence":"first","affiliation":[]},{"given":"Ankur","family":"Chowdhary","sequence":"additional","affiliation":[]},{"given":"Dijiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Subbarao","family":"Kambhampati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,23]]},"reference":[{"key":"29_CR1","unstructured":"National vulnerability database. https:\/\/nvd.nist.gov . Accessed 25 Sept 2018"},{"key":"29_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1007\/978-3-030-01554-1_36","volume-title":"Decision and Game Theory for Security","author":"A Basak","year":"2018","unstructured":"Basak, A., et al.: An initial study of targeted personality models in the flipit game. In: Bushnell, L., Poovendran, R., Ba\u015far, T. (eds.) GameSec 2018. LNCS, vol. 11199, pp. 623\u2013636. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01554-1_36"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Chowdhary, A., Dixit, V.H., Tiwari, N., Kyung, S., Huang, D., Ahn, G.J.: Science DMZ: SDN based secured cloud testbed. In: IEEE Conference on Network Function Virtualization and Software Defined Networks (2017)","DOI":"10.1109\/NFV-SDN.2017.8169868"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Chowdhary, A., Pisharody, S., Huang, D.: SDN based scalable MTD solution in cloud network. In: ACM Workshop on Moving Target Defense (2016)","DOI":"10.1145\/2995272.2995274"},{"key":"29_CR5","unstructured":"Chowdhary, A., Sengupta, S., Huang, D., Kambhampati, S.: Markov game modeling of moving target defense for strategic detection of threats in cloud networks. In: AAAI Workshop on Artificial Intelligence for Cyber Security (2019)"},{"issue":"4","key":"29_CR6","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TDSC.2013.8","volume":"10","author":"CJ Chung","year":"2013","unstructured":"Chung, C.J., Khatkar, P., Xing, T., Lee, J., Huang, D.: NICE: network intrusion detection and countermeasure selection in virtual network systems. IEEE Trans. Dependable Secure Comput. 10(4), 198\u2013211 (2013)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"29_CR7","unstructured":"Western Regional Collegiate Cyber Defense Competition: WRCCDC (2018). https:\/\/archive.wrccdc.org\/images\/2018\/"},{"key":"29_CR8","unstructured":"Nagios Enterprises: Nagios (2015)"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Guerrero, D., Carsteanu, A.A., Huerta, R., Clempner, J.B.: An iterative method for solving Stackelberg security games: a Markov games approach. In: 2017 14th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICEEE.2017.8108857"},{"issue":"9","key":"29_CR10","first-page":"1622","volume":"83","author":"SH Houmb","year":"2010","unstructured":"Houmb, S.H., Franqueira, V.N., Engum, E.A.: Quantifying security risk level from cvss estimates of frequency and impact. JSS 83(9), 1622\u20131634 (2010)","journal-title":"JSS"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/3137571","volume":"18","author":"S Jajodia","year":"2018","unstructured":"Jajodia, S., Park, N., Serra, E., Subrahmanian, V.: SHARE: a Stackelberg honey-based adversarial reasoning engine. ACM Trans. Internet Technol. (TOIT) 18, 30 (2018)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"29_CR12","unstructured":"Jha, S., Sheyner, O., Wing, J.: Two formal analyses of attack graphs. In: 2002 Proceedings of the 15th IEEE Computer Security Foundations Workshop, pp. 49\u201363. IEEE (2002)"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Jia, Q., Sun, K., Stavrou, A.: MOTAG: moving target defense against internet denial of service attacks. In: 2013 22nd International Conference on Computer Communication and Networks, pp. 1\u20139. IEEE (2013)","DOI":"10.1109\/ICCCN.2013.6614155"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Kampanakis, P., Perros, H., Beyene, T.: SDN-based solutions for moving target defense network protection. In: IEEE 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks. IEEE (2014)","DOI":"10.1109\/WoWMoM.2014.6918979"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Korzhyk, D., Conitzer, V., Parr, R.: Complexity of computing optimal Stackelberg strategies in security resource allocation games. In: AAAI (2010)","DOI":"10.1609\/aaai.v24i1.7638"},{"issue":"2","key":"29_CR16","first-page":"297","volume":"41","author":"D Korzhyk","year":"2011","unstructured":"Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. nash in security games: an extended investigation of interchangeability, equivalence, and uniqueness. J. Artif. Int. Res. 41(2), 297\u2013327 (2011). http:\/\/dl.acm.org\/citation.cfm?id=2051237.2051246","journal-title":"J. Artif. Int. Res."},{"key":"29_CR17","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1613\/jair.3269","volume":"41","author":"D Korzhyk","year":"2011","unstructured":"Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. nash in security games: an extended investigation of interchangeability, equivalence, and uniqueness. J. Artif. Intell. Res. 41, 297\u2013327 (2011)","journal-title":"J. Artif. Intell. Res."},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Littman, M.L.: Markov games as a framework for multi-agent reinforcement learning. In: Eleventh International Conference on Machine Learning (1994)","DOI":"10.1016\/B978-1-55860-335-6.50027-1"},{"key":"29_CR19","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s10207-004-0060-x","volume":"4","author":"KW Lye","year":"2005","unstructured":"Lye, K.W., Wing, J.M.: Game strategies in network security. Int. J. Inf. Secur. 4, 71\u201386 (2005)","journal-title":"Int. J. Inf. Secur."},{"key":"29_CR20","unstructured":"McCumber, J.: Information systems security: a comprehensive model. In: Proceedings of the 14th National Computer Security Conference (1991)"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Miehling, E., Rasouli, M., Teneketzis, D.: Optimal defense policies for partially observable spreading processes on Bayesian attack graphs. In: Proceedings of the Second ACM Workshop on Moving Target Defense, pp. 67\u201376. ACM (2015)","DOI":"10.1145\/2808475.2808482"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Nguyen, T.H., Wright, M., Wellman, M.P., Singh, S.: Multistage attack graph security games: heuristic strategies, with empirical game-theoretic analysis. In: Security and Communication Networks 2018 (2018)","DOI":"10.1155\/2018\/2864873"},{"key":"29_CR23","unstructured":"Paruchuri, P., Pearce, J.P., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games. In: AAMAS 2008, pp. 895\u2013902 (2008)"},{"key":"29_CR24","unstructured":"Paruchuri, P., Pearce, J.P., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games. In: AAMAS (2008)"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Peng, W., Li, F., Huang, C.T., Zou, X.: A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces. In: IEEE International Conference on Communications (ICC) (2014)","DOI":"10.1109\/ICC.2014.6883418"},{"key":"29_CR26","unstructured":"Schlenker, A., et al.: Deceiving cyber adversaries: a game theoretic approach. In: Proceedings of the 17th International Conference on Autonomous Agents and Multi Agent Systems, pp. 892\u2013900. International Foundation for Autonomous Agents and Multiagent Systems (2018)"},{"key":"29_CR27","doi-asserted-by":"crossref","unstructured":"Sengupta, S., Chakraborti, T., Kambhampati, S.: MTDeep: boosting the security of deep neural nets against adversarial attacks with moving target defense. In: Workshop on Engineering Dependable and Secure Machine Learning Systems. AAAI (2018)","DOI":"10.1007\/978-3-030-32430-8_28"},{"key":"29_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-030-01554-1_19","volume-title":"Decision and Game Theory for Security","author":"S Sengupta","year":"2018","unstructured":"Sengupta, S., Chowdhary, A., Huang, D., Kambhampati, S.: Moving target defense for the placement of intrusion detection systems in the cloud. In: Bushnell, L., Poovendran, R., Ba\u015far, T. (eds.) GameSec 2018. LNCS, vol. 11199, pp. 326\u2013345. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01554-1_19"},{"key":"29_CR29","unstructured":"Sengupta, S., et al.: A game theoretic approach to strategy generation for moving target defense in web applications. In: AAMAS (2017)"},{"issue":"10","key":"29_CR30","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1073\/pnas.39.10.1953","volume":"39","author":"LS Shapley","year":"1953","unstructured":"Shapley, L.S.: Stochastic games. Proc. Nat. Acad. Sci. 39(10), 1095\u20131100 (1953)","journal-title":"Proc. Nat. Acad. Sci."},{"issue":"1","key":"29_CR31","first-page":"19","volume":"1","author":"A Sinha","year":"2015","unstructured":"Sinha, A., Nguyen, T.H., Kar, D., Brown, M., Tambe, M., Jiang, A.X.: From physical security to cybersecurity. J. Cybersecur. 1(1), 19\u201335 (2015)","journal-title":"J. Cybersecur."},{"key":"29_CR32","doi-asserted-by":"crossref","unstructured":"Venkatesan, S., Albanese, M., Cybenko, G., Jajodia, S.: A moving target defense approach to disrupting stealthy botnets. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense, pp. 37\u201346. ACM (2016)","DOI":"10.1145\/2995272.2995280"},{"key":"29_CR33","unstructured":"Vorobeychik, Y., Singh, S.: Computing Stackelberg equilibria in discounted stochastic games (corrected version) (2012)"},{"key":"29_CR34","unstructured":"Zhuang, R., DeLoach, S.A., Ou, X.: Towards a theory of moving target defense. In: ACM MTD Workshop, 2014, pp. 31\u201340. ACM (2014)"},{"key":"29_CR35","doi-asserted-by":"crossref","unstructured":"Zhuang, R., Zhang, S., Bardas, A., DeLoach, S.A., Ou, X., Singhal, A.: Investigating the application of moving target defenses to network security. In: 6th International Symposium on Resilient Control Systems (ISRCS). IEEE (2013)","DOI":"10.1109\/ISRCS.2013.6623770"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32430-8_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,2]],"date-time":"2022-10-02T16:41:22Z","timestamp":1664728882000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32430-8_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030324292","9783030324308"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32430-8_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Decision and Game Theory for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Stockholm","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.gamesec-conf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}