{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:18:42Z","timestamp":1774264722554,"version":"3.50.1"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319474120","type":"print"},{"value":"9783319474137","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47413-7_2","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T16:20:15Z","timestamp":1475598015000},"page":"18-38","source":"Crossref","is-referenced-by-count":23,"title":["Deception-Based Game Theoretical Approach to Mitigate DoS Attacks"],"prefix":"10.1007","author":[{"given":"Hayreddin","family":"\u00c7eker","sequence":"first","affiliation":[]},{"given":"Jun","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Shambhu","family":"Upadhyaya","sequence":"additional","affiliation":[]},{"given":"Quang Duy","family":"La","sequence":"additional","affiliation":[]},{"given":"Boon-Hee","family":"Soong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"issue":"2","key":"2_CR1","first-page":"145","volume":"5","author":"A Agah","year":"2007","unstructured":"Agah, A., Das, S.K.: Preventing DoS attacks in wireless sensor networks: a repeated game theory approach. IJ Netw. Secur. 5(2), 145\u2013153 (2007)","journal-title":"IJ Netw. Secur."},{"issue":"1","key":"2_CR2","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/0167-7187(89)90036-2","volume":"8","author":"K Bagwell","year":"1990","unstructured":"Bagwell, K., Ramey, G.: Advertising and pricing to deter or accommodate entry when demand is unknown. Int. J. Indus. Organ. 8(1), 93\u2013113 (1990)","journal-title":"Int. J. Indus. Organ."},{"key":"2_CR3","volume-title":"Know Your Enemy: Learning About Security Threats","author":"E Balas","year":"2004","unstructured":"Balas, E.: Know Your Enemy: Learning About Security Threats. Addison Wesley, Boston (2004)"},{"issue":"6","key":"2_CR4","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1016\/j.cose.2009.01.002","volume":"28","author":"S Basagiannis","year":"2009","unstructured":"Basagiannis, S., Katsaros, P., Pombortsis, A., Alexiou, N.: Probabilistic model checking for the quantification of DoS security threats. Comput. Secur. 28(6), 450\u2013465 (2009)","journal-title":"Comput. Secur."},{"key":"2_CR5","volume-title":"Cheating and Deception","author":"JB Bell","year":"1991","unstructured":"Bell, J.B., Whaley, B.: Cheating and Deception. Transaction Publishers, Brunswick (1991)"},{"key":"2_CR6","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1002\/sec.242","volume":"4","author":"TE Carroll","year":"2011","unstructured":"Carroll, T.E., Grosu, D.: A game theoretic investigation of deception in network security. Secur. Commun. Netw. 4, 1162\u20131172 (2011)","journal-title":"Secur. Commun. Netw."},{"key":"2_CR7","unstructured":"Center, C.C.: Results of the distributed-systems intruder tools workshop. Software Engineering Institute (1999)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Cohen, F., Koike, D.: Misleading attackers with deception. In: Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, pp. 30\u201337. IEEE (2004)","DOI":"10.1109\/IAW.2004.1437794"},{"issue":"1","key":"2_CR9","first-page":"1","volume":"9","author":"Y Fong","year":"2009","unstructured":"Fong, Y.: Private information of nonpaternalistic altruism: exaggeration and reciprocation of generosity. Adv. Theor. Econ. 9(1), 1 (2009)","journal-title":"Adv. Theor. Econ."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Fu, X., Yu, W., Cheng, D., Tan, X., Streff, K., Graham, S.: On recognizing virtual honeypots and countermeasures. In: 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 211\u2013218. IEEE (2006)","DOI":"10.1109\/DASC.2006.36"},{"issue":"2","key":"2_CR11","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/0022-0531(91)90155-W","volume":"53","author":"D Fudenberg","year":"1991","unstructured":"Fudenberg, D., Tirole, J.: Perfect Bayesian equilibrium and sequential equilibrium. J. Econ. Theor. 53(2), 236\u2013260 (1991)","journal-title":"J. Econ. Theor."},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Gao, X., Zhu, Y.-F.: DDoS defense mechanism analysis based on signaling game model. In: 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics, pp. 414\u2013417 (2013)","DOI":"10.1109\/IHMSC.2013.105"},{"key":"2_CR13","unstructured":"Hamilton, S.N., Miller, W.L., Ott, A., Saydjari, O.S.: The role of game theory in information warfare. In: 4th Information Survivability Workshop (ISW-2001\/2002), Vancouver, Canada (2002)"},{"key":"2_CR14","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/978-3-319-25594-1_14","volume-title":"Decision and Game Theory for Security","author":"C Heitzenrater","year":"2015","unstructured":"Heitzenrater, C., Taylor, G., Simpson, A.: When the winning move is not to play: games of deterrence in cyber security. In: Khouzani, M.H.R., Panaousis, E., Theodorakopoulos, G. (eds.) Decision and Game Theory for Security, pp. 250\u2013269. Springer, Heidelberg (2015)"},{"issue":"1","key":"2_CR15","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/TWC.2004.840210","volume":"4","author":"Z Jiang","year":"2005","unstructured":"Jiang, Z., Ge, Y., Li, Y.: Max-utility wireless resource management for best-effort traffic. IEEE Trans. Wirel. Commun. 4(1), 100\u2013111 (2005)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"2_CR16","first-page":"1","volume":"PP(99)","author":"QD La","year":"2016","unstructured":"La, Q.D., Quek, T., Lee, J., Jin, S., Zhu, H.: Deceptive attack and defense game in honeypot-enabled networks for the internet of things. IEEE Internet Things J. PP(99), 1 (2016)","journal-title":"IEEE Internet Things J."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Lau, F., Rubin, S.H., Smith, M.H., Trajkovic, L.: Distributed denial of service attacks. In: 2000 IEEE International Conference on Systems, Man, and Cybernetics, vol. 3, pp. 2275\u20132280. IEEE (2000)","DOI":"10.1109\/ICSMC.2000.886455"},{"issue":"1\u20132","key":"2_CR18","first-page":"71","volume":"4","author":"KW Lye","year":"2005","unstructured":"Lye, K.W., Wing, J.M.: Game strategies in network security. Int. J. Inf. Secur. 4(1\u20132), 71\u201386 (2005)","journal-title":"Int. J. Inf. Secur."},{"issue":"6","key":"2_CR19","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/MSECP.2003.1253575","volume":"1","author":"B McCarty","year":"2003","unstructured":"McCarty, B.: The honeynet arms race. IEEE Secur. Priv. 1(6), 79\u201382 (2003)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"2_CR20","doi-asserted-by":"crossref","first-page":"143","DOI":"10.3233\/JCS-2001-91-206","volume":"9","author":"C Meadows","year":"2001","unstructured":"Meadows, C.: A cost-based framework for analysis of denial of service in networks. J. Comput. Secur. 9(1), 143\u2013164 (2001)","journal-title":"J. Comput. Secur."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"P\u00edbil, R., Lis\u00fd, V., Kiekintveld, C., Bo\u0161ansk\u00fd, B., P\u011bchou\u010dek, M.: Game theoretic model of strategic honeypot selection in computer networks. In: Decision and Game Theory for, Security, pp. 201\u2013220 (2012)","DOI":"10.1007\/978-3-642-34266-0_12"},{"key":"2_CR22","first-page":"99","volume-title":"Decision and Game Theory for Security","author":"M Rasouli","year":"2014","unstructured":"Rasouli, M., Miehling, E., Teneketzis, D.: A supervisory control approach to dynamic cyber-security. In: Poovendran, R., Saad, W. (eds.) Decision and Game Theory for Security, pp. 99\u2013117. Springer, Heidelberg (2014)"},{"key":"2_CR23","first-page":"118","volume-title":"Decision and Game Theory for Security","author":"S Rass","year":"2014","unstructured":"Rass, S., Rainer, B.: Numerical computation of multi-goal security strategies. In: Poovendran, R., Saad, W. (eds.) Decision and Game Theory for Security, pp. 118\u2013133. Springer, Heidelberg (2014)"},{"issue":"2","key":"2_CR24","first-page":"25","volume":"2","author":"NC Rowe","year":"2007","unstructured":"Rowe, N.C., Custy, E.J., Duong, B.T.: Defending cyberspace with fake honeypots. J. Comput. 2(2), 25\u201336 (2007)","journal-title":"J. Comput."},{"issue":"3","key":"2_CR25","first-page":"521","volume":"6","author":"S Shen","year":"2011","unstructured":"Shen, S., Yue, G., Cao, Q., Yu, F.: A survey of game theory in wireless sensor networks security. J. Netw. 6(3), 521\u2013532 (2011)","journal-title":"J. Netw."},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Wang, W., Chatterjee, M., Kwiat, K.: Coexistence with malicious nodes: a game theoretic approach. In: International Conference on Game Theory for Networks, GameNets 2009, pp. 277\u2013286. IEEE (2009)","DOI":"10.1109\/GAMENETS.2009.5137411"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Wu, Q., Shiva, S., Roy, S., Ellis, C., Datla, V.: On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks. In: Proceedings of the 2010 Spring Simulation Multiconference, p. 159. Society for Computer Simulation International (2010)","DOI":"10.1145\/1878537.1878703"},{"issue":"5","key":"2_CR28","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1007\/s11859-008-0524-3","volume":"13","author":"L Yang","year":"2008","unstructured":"Yang, L., Mu, D., Cai, X.: Preventing dropping packets attack in sensor networks: a game theory approach. Wuhan Univ. J. Nat. Sci. 13(5), 631\u2013635 (2008)","journal-title":"Wuhan Univ. J. Nat. Sci."},{"issue":"12","key":"2_CR29","doi-asserted-by":"crossref","first-page":"1737","DOI":"10.1111\/j.1539-6924.2010.01455.x","volume":"30","author":"J Zhuang","year":"2010","unstructured":"Zhuang, J., Bier, V.M.: Reasons for secrecy and deception in homeland-security resource allocation. Risk Anal. 30(12), 1737\u20131743 (2010)","journal-title":"Risk Anal."},{"issue":"1","key":"2_CR30","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1080\/10242694.2010.491668","volume":"22","author":"J Zhuang","year":"2011","unstructured":"Zhuang, J., Bier, V.M.: Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation. Defence Peace Econ. 22(1), 43\u201361 (2011)","journal-title":"Defence Peace Econ."},{"issue":"2","key":"2_CR31","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1016\/j.ejor.2009.07.028","volume":"203","author":"J Zhuang","year":"2010","unstructured":"Zhuang, J., Bier, V.M., Alagoz, O.: Modeling secrecy and deception in a multiple-period attacker-defender signaling game. Eur. J. Oper. Res. 203(2), 409\u2013418 (2010)","journal-title":"Eur. J. Oper. Res."}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47413-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T20:20:41Z","timestamp":1498335641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47413-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319474120","9783319474137"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47413-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}