{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T02:07:43Z","timestamp":1747274863518},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600796"},{"type":"electronic","value":"9783319600802"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60080-2_20","type":"book-chapter","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T14:40:06Z","timestamp":1496328006000},"page":"269-287","source":"Crossref","is-referenced-by-count":7,"title":["Attack Graph Obfuscation"],"prefix":"10.1007","author":[{"given":"Hadar","family":"Polad","sequence":"first","affiliation":[]},{"given":"Rami","family":"Puzis","sequence":"additional","affiliation":[]},{"given":"Bracha","family":"Shapira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,2]]},"reference":[{"key":"20_CR1","unstructured":"Honeynet project. \nhttps:\/\/www.honeynet.org\/"},{"key":"20_CR2","unstructured":"Labrea: \u201cSticky\u201d honeypot and ids. \nhttp:\/\/labrea.sourceforge.net\/labrea-info.html"},{"key":"20_CR3","unstructured":"National vulnerability database. \nhttps:\/\/nvd.nist.gov\/"},{"key":"20_CR4","unstructured":"Openvas. \nhttp:\/\/www.openvas.org\/"},{"key":"20_CR5","unstructured":"Deraison, R.: The Nessus project. \nhttp:\/\/www.nessus.org"},{"key":"20_CR6","unstructured":"Almeshekah, M.H.: Using deception to enhance security: a taxonomy, model, and novel uses. Ph.D. dissertation, Purdue University (2015)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 217\u2013224. ACM (2002)","DOI":"10.1145\/586110.586140"},{"key":"20_CR8","unstructured":"Chatterjee, S.: Dragon: a framework for computing preferred defense policies from logical attack graphs. Ph.D. dissertation, Iowa State University (2014)"},{"key":"20_CR9","unstructured":"Cohen, F.: Deception tool kit. \nhttp:\/\/all.net\/dtk\/"},{"issue":"5","key":"20_CR10","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1016\/S0167-4048(03)00506-6","volume":"22","author":"F Cohen","year":"2003","unstructured":"Cohen, F., Koike, D.: Leading attackers through attack graphs with deceptions. Comput. Secur. 22(5), 402\u2013411 (2003)","journal-title":"Comput. Secur."},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Cohen, F., Koike, D.: Misleading attackers with deception. In: Proceedings from the Fifth Annual IEEE SMC on Information Assurance Workshop, pp. 30\u201337. IEEE (2004)","DOI":"10.1109\/IAW.2004.1437794"},{"key":"20_CR12","unstructured":"Durkota, K., Lis\u1ef3, V., Bo\u0161ansk\u1ef3, B., Kiekintveld, C.: Optimal network security hardening using attack graph games. In: Proceedings of IJCAI, pp. 7\u201314 (2015)"},{"key":"20_CR13","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s10462-007-9049-y","volume":"26","author":"M Helmert","year":"2006","unstructured":"Helmert, M.: The fast downward planning system. J. Artif. Intell. Res. (JAIR) 26, 191\u2013246 (2006)","journal-title":"J. Artif. Intell. Res. (JAIR)"},{"key":"20_CR14","unstructured":"Huber, K.E.: Host-based systemic network obfuscation system for windows. Technical report, DTIC Document (2011)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Kewley, D., Fink, R., Lowry, J., Dean, M.: Dynamic approaches to thwart adversary intelligence gathering. In: Proceedings of DARPA Information Survivability Conference and Exposition II, DISCEX 2001, vol. 1, pp. 176\u2013185. IEEE (2001)","DOI":"10.1109\/DISCEX.2001.932214"},{"issue":"3","key":"20_CR16","first-page":"2231","volume":"1","author":"S Khaitan","year":"2011","unstructured":"Khaitan, S., Raheja, S.: Finding optimal attack path using attack graphs: a survey. Int. J. Soft Comput. Eng. 1(3), 2231\u20132307 (2011)","journal-title":"Int. J. Soft Comput. Eng."},{"key":"20_CR17","unstructured":"Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. nash in security games: an extended investigation of interchangeability, equivalence, and uniqueness. J. Artif. Intell. Res. (JAIR) 41, 297\u2013327 (2011)"},{"issue":"3","key":"20_CR18","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei, M.H., Zhu, Q., Alpcan, T., Bac\u015far, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Comput. Surv. (CSUR) 45(3), 25 (2013)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"20_CR19","unstructured":"Murphy, S., McDonald, T., Mills, R.: An application of deception in cyberspace: Operating system obfuscation1. In: International Conference on Information Warfare and Security, p. 241. Academic Conferences International Limited (2010)"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Ou, X., Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 336\u2013345. ACM (2006)","DOI":"10.1145\/1180405.1180446"},{"key":"20_CR21","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: a logic-based network security analyzer. In: USENIX Security (2005)"},{"key":"20_CR22","unstructured":"Repik, K.A.: Defeating adversary network intelligence efforts with active cyber defense techniques. No. AFIT\/ICW\/ENG\/08-11. Air Force Inst of Tech Wright-Patterson AFB OH School of Engineering and Management (2008)"},{"key":"20_CR23","unstructured":"SANS Institute Reading Room: Installing, Configuring, and Testing The Deception Tool Kit on Mac OS X (2006). \nhttps:\/\/www.sans.org\/reading-room\/whitepapers\/detection\/installing-configuring-testing-deception-tool-kit-mac-os-1056"},{"issue":"2","key":"20_CR24","first-page":"25","volume":"2","author":"NC Rowe","year":"2007","unstructured":"Rowe, N.C., Custy, E.J., Duong, B.T.: Defending cyberspace with fake honeypots. J. Comput. 2(2), 25\u201336 (2007)","journal-title":"J. Comput."},{"key":"20_CR25","unstructured":"Sarraute, C., Buffet, O., Hoffmann, J.: Penetration testing==POMDP solving? arXiv preprint \narXiv:1306.4714\n\n (2013)"},{"key":"20_CR26","unstructured":"Sarraute, C., Buffet, O., Hoffmann, J.: POMDPs make better hackers: accounting for uncertainty in penetration testing. arXiv preprint \narXiv:1307.8182\n\n (2013)"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: Proceedings of 2002 IEEE Symposium on Security and Privacy, pp. 273\u2013284. IEEE (2002)","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"20_CR28","unstructured":"Sheyner, O.M.: Scenario graphs and attack graphs. Ph.D. dissertation, US Air Force Research Laboratory (2004)"}],"container-title":["Lecture Notes in Computer Science","Cyber Security Cryptography and Machine Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60080-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T14:46:01Z","timestamp":1496328361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60080-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600796","9783319600802"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60080-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}