{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T11:21:27Z","timestamp":1710328887977},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,2,3]],"date-time":"2010-02-03T00:00:00Z","timestamp":1265155200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1007\/s10878-009-9285-y","type":"journal-article","created":{"date-parts":[[2010,2,2]],"date-time":"2010-02-02T11:34:37Z","timestamp":1265110477000},"page":"305-324","source":"Crossref","is-referenced-by-count":7,"title":["Honeynet games: a game theoretic approach to\u00a0defending network monitors"],"prefix":"10.1007","volume":"22","author":[{"given":"Jin-Yi","family":"Cai","sequence":"first","affiliation":[]},{"given":"Vinod","family":"Yegneswaran","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Alfeld","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Barford","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,2,3]]},"reference":[{"key":"9285_CR1","doi-asserted-by":"crossref","unstructured":"Antonatos S, Akritidis P, Markatos E, Anagnostakis K (2005) Defending against hitlist worms using network address space randomization. In: Proceedings of ACM CCS WORM \u201905, Fairfax, VA, November 2005","DOI":"10.1145\/1103626.1103633"},{"key":"9285_CR2","unstructured":"Atighetchi M, Pal P, Webber F, Schantz R, Jones C (2003) Adaptive use of network-centric mechanisms in cyber defense. In: Proceedings of the 6th international symposium on object-oriented real-time distributed computing, May 2003"},{"key":"9285_CR3","unstructured":"Bailey M, Cooke E, Jahanian F, Nazario J, Watson D (2005) The Internet motion sensor: A distributed blackhole monitoring system. In: Proceedings of the 12th network and distributed systems security symposium (NDSS \u201905), San Diego, CA, February 2005"},{"key":"9285_CR4","unstructured":"Bethencourt J, Franklin J, Vernon M (2005) Mapping Internet sensors with probe response packets. In: Proceedings of USENIX security symposium"},{"key":"9285_CR5","unstructured":"Casado M, Garfinkel T, Cui W, Paxson V, Savage S (2005) Opportunistic measurement. In: Proceedings of the fourth workshop on hot topics in networks (HotNets IV), College Park, MD, November 2005"},{"key":"9285_CR6","doi-asserted-by":"crossref","unstructured":"Cooke E, Bailey M, Mao M, Watson D, Jahanian F, McPherson D (2004) Toward understanding distributed blackhole placement. In: Proceedings of CCS workshop on rapid malcode (WORM \u201904), October 2004","DOI":"10.1145\/1029618.1029627"},{"key":"9285_CR7","doi-asserted-by":"crossref","unstructured":"Dagon D, Qin X, Gu G, Lee W, Grizzard J, Levine J, Owen H (2004) Honeystat: local worm detection using honeypots. In: Proceedings of symposium on recent advances in intrusion detection (RAID), Sophia Antipolis, France, September 2004","DOI":"10.1007\/978-3-540-30143-1_3"},{"key":"9285_CR8","unstructured":"German Honeynet Project (2005) Tracking botnets. http:\/\/www.honeynet.org\/papers\/bots"},{"key":"9285_CR9","unstructured":"Jiang X, Xu D (2004) A vm-based architecture for network attack detention center. In: Proceedings of the USENIX security symposium, San Diego, CA, August 2004"},{"key":"9285_CR10","unstructured":"Kewley D, Lowry J, Fink R, Dean M (2001) Dynamic approaches to thwart adversary intelligence gathering. In: Proceedings of the DARPA information survivability conference and exposition (DISCEX)"},{"key":"9285_CR11","unstructured":"Michalski J, Price C, Stanton E, Chua E, Seah K, Heng W, Pheng T (2002) Final report for the network security mechanisms utilizing network address translation ldrd project. Technical Report SAND2002-3613, Sandia National Laboratories, November 2002"},{"key":"9285_CR12","doi-asserted-by":"crossref","unstructured":"Pang R, Yegneswaran V, Barford P, Paxson V, Peterson L (2004) Characteristics of Internet background radiation. In: Proceedings of the ACM SIGCOMM Internet measurement conference","DOI":"10.1145\/1028788.1028794"},{"key":"9285_CR13","unstructured":"Provos N (2004) A virtual honeypot framework. In: Proceedings of USENIX security symposium"},{"key":"9285_CR14","doi-asserted-by":"crossref","unstructured":"Rajab MA, Monrose F, Terzis A (2006) Fast and evasive attacks: highlighting the challenges ahead. In: RAID","DOI":"10.1007\/11856214_11"},{"key":"9285_CR15","unstructured":"Shinoda Y, Ikai K, Itoh M (2005) Vulnerabilities of passive Internet threat monitors. In: Proceedings of USENIX security symposium"},{"key":"9285_CR16","unstructured":"Staniford S, Paxson V, Weaver N (2002) How to 0wn the Internet in your spare time. In: Proceedings of the 11th USENIX security symposium"},{"key":"9285_CR17","unstructured":"Ullrich J (2005) Dshield. http:\/\/www.dshield.org"},{"key":"9285_CR18","doi-asserted-by":"crossref","unstructured":"Vrable M, Ma J, Chen J, Moore D, Vandekieft E, Snoeren A, Voelker G, Savage S (2005) Scalability, fidelity and containment in the Potemkin virtual honeyfarm. In: Proceedings of ACM SOSP \u201905, Brighton, UK, October 2005","DOI":"10.1145\/1095810.1095825"},{"key":"9285_CR19","unstructured":"W32 Agobot IB (2005) http:\/\/www.sophos.com\/virusinfo\/analyses\/trojagobotib.html"},{"key":"9285_CR20","doi-asserted-by":"crossref","unstructured":"Yegneswaran V, Barford P, Ullrich J (2003) Internet intrusions: global characteristics and prevalence. In: Proceedings ACM SIGMETRICS","DOI":"10.1145\/781044.781045"},{"key":"9285_CR21","doi-asserted-by":"crossref","unstructured":"Yegneswaran V, Barford P, Plonka D (2004) On the design and use of Internet sinks for network abuse monitoring. In: Proceedings RAID","DOI":"10.1007\/978-3-540-30143-1_8"},{"key":"9285_CR22","unstructured":"Yegneswaran V, Barford P, Paxson V (2005) Using honeynets for Internet situational awareness. In: Proc. ACM Hotnets"},{"key":"9285_CR23","doi-asserted-by":"crossref","unstructured":"Yegneswaran V, Alfeld C, Barford P, Cai J-Y (2007) Camouflaging honeynets. In: Proceedings of IEEE global Internet symposium","DOI":"10.1109\/GI.2007.4301430"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-009-9285-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10878-009-9285-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-009-9285-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T00:18:15Z","timestamp":1559261895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10878-009-9285-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,3]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,10]]}},"alternative-id":["9285"],"URL":"https:\/\/doi.org\/10.1007\/s10878-009-9285-y","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"value":"1382-6905","type":"print"},{"value":"1573-2886","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,2,3]]}}}