{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:31:28Z","timestamp":1772724688450,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319458700","type":"print"},{"value":"9783319458717","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45871-7_13","type":"book-chapter","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T08:25:24Z","timestamp":1472113524000},"page":"203-217","source":"Crossref","is-referenced-by-count":8,"title":["Moving Target Defense Against Network Reconnaissance with Software Defined Networking"],"prefix":"10.1007","author":[{"given":"Li","family":"Wang","sequence":"first","affiliation":[]},{"given":"Dinghao","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,26]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/978-1-4614-0977-9_9","volume-title":"Moving Target Defense","author":"E Al-Shaer","year":"2011","unstructured":"Al-Shaer, E.: Toward network configuration randomization for moving target defense. In: Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.) Moving Target Defense, vol. 54, pp. 153\u2013159. Springer, New York (2011)"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Allman, M., Paxson, V., Terrell, J.: A brief history of scanning. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp. 77\u201382 (2007)","DOI":"10.1145\/1298306.1298316"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Davoli, R.: VDE: virtual distributed ethernet. In: 1st International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, pp. 213\u2013220. IEEE (2005)","DOI":"10.1109\/TRIDNT.2005.38"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Dunlop, M., Groat, S., Urbanski, W., Marchany, R., Tront, J.: MT6D: A moving target IPv6 defense. In: Military Communications Conference. IEEE (2011)","DOI":"10.1109\/MILCOM.2011.6127486"},{"key":"13_CR5","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-1-4614-0977-9_2","volume-title":"Moving Target Defense","author":"D Evans","year":"2011","unstructured":"Evans, D., Nguyen-Tuong, A., Knight, J.: Effectiveness of moving target defenses. In: Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.) Moving Target Defense, vol. 54, pp. 29\u201348. Springer, New York (2011)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Gadge, J., Patil, A.A.: Port scan detection. In: 16th IEEE International Conference on Networks, ICON 2008, pp. 1\u20136. IEEE (2008)","DOI":"10.1109\/ICON.2008.4772622"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Groat, S., Dunlop, M., Urbanksi, W., Marchany, R., Tront, J.: Using an IPv6 moving target defense to protect the smart grid. In: 2012 IEEE PES Innovative Smart Grid Technologies (ISGT), pp. 1\u20137, January 2012","DOI":"10.1109\/ISGT.2012.6175633"},{"key":"13_CR8","series-title":"Advances in Information Security","volume-title":"Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats","year":"2011","unstructured":"Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.): Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats. Advances in Information Security, vol. 54. Springer, New York (2011)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Kewley, D., Fink, R., Lowry, J., Dean, M.: Dynamic approaches to thwart adversary intelligence gathering. In: Proceedings of DARPA Information Survivability Conference and Exposition II, pp. 176\u2013185 (2001)","DOI":"10.1109\/DISCEX.2001.932214"},{"key":"13_CR10","first-page":"225","volume":"1","author":"A Kivity","year":"2007","unstructured":"Kivity, A., Kamay, Y., Laor, D., Lublin, U., Liguori, A.: KVM: the Linux virtual machine monitor. Proc. Linux Symp. 1, 225\u2013230 (2007)","journal-title":"Proc. Linux Symp."},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Lantz, B., Heller, B., McKeown, N.: A network in a laptop: rapid prototyping for software-defined networks. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, p. 19 (2010)","DOI":"10.1145\/1868447.1868466"},{"key":"13_CR12","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1109\/SURV.2013.081313.00105","volume":"16","author":"A Lara","year":"2014","unstructured":"Lara, A., Kolasani, A., Ramamurthy, B.: Network innovation using openflow: a survey. IEEE Commun. Surv. Tutorials 16, 493\u2013512 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"13_CR13","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"HJ Liao","year":"2013","unstructured":"Liao, H.J., Lin, C.H.R., Lin, Y.C.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36, 16\u201324 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"13_CR14","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: Openflow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"1","key":"13_CR15","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.ijcip.2012.01.002","volume":"5","author":"H Okhravi","year":"2012","unstructured":"Okhravi, H., Comella, A., Robinson, E., Haines, J.: Creating a cyber moving target for critical infrastructure applications using platform diversity. Int. J. Crit. Infrastruct. Prot. 5(1), 30\u201339 (2012)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Panjwani, S., Tan, S., Jarrin, K.M., Cukier, M.: An experimental evaluation to determine if port scans are precursors to an attack. In: Proceedings on International Conference on Dependable Systems and Networks, DSN 2005, pp. 602\u2013611. IEEE (2005)","DOI":"10.1109\/DSN.2005.18"},{"key":"13_CR17","unstructured":"Provos, N.: Honeyd-a virtual honeypot Daemon. In: 10th DFN-CERT Workshop, Hamburg, Germany, vol. 2, p. 4 (2003)"},{"key":"13_CR18","first-page":"105","volume-title":"Moving Target Defense","author":"M Rinard","year":"2011","unstructured":"Rinard, M.: Manipulating program functionality to eliminate security vulnerabilities. In: Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.) Moving Target Defense, vol. 54, pp. 105\u2013115. Springer, New York (2011)"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Shacham, H., Page, M., Pfaff, B., Goh, E.J., Modadugu, N., Boneh, D.: On the effectiveness of address-space randomization. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 298\u2013307 (2004)","DOI":"10.1145\/1030083.1030124"},{"issue":"1\/2","key":"13_CR20","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3233\/JCS-2002-101-205","volume":"10","author":"S Staniford","year":"2002","unstructured":"Staniford, S., Hoagland, J.A., McAlerney, J.M.: Practical automated detection of stealthy portscans. J. Comput. Secur. 10(1\/2), 105\u2013136 (2002)","journal-title":"J. Comput. Secur."},{"key":"13_CR21","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.comcom.2014.03.009","volume":"46","author":"H Wang","year":"2014","unstructured":"Wang, H., Jia, Q., Fleck, D., Powell, W., Li, F., Stavrou, A.: A moving target DDoS defense mechanism. Comput. Commun. 46, 10\u201321 (2014)","journal-title":"Comput. Commun."},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Xing, T., Huang, D., Xu, L., Chung, C.J., Khatkar, P.: Snortflow: a openflow-based intrusion prevention system in cloud environment. In: Research and Educational Experiment Workshop (GREE), Second GENI, pp. 89\u201392. IEEE (2013)","DOI":"10.1109\/GREE.2013.25"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45871-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:21:12Z","timestamp":1498339272000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45871-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319458700","9783319458717"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45871-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}