{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:24:46Z","timestamp":1763202286979,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T00:00:00Z","timestamp":1568937600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T00:00:00Z","timestamp":1568937600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11235-019-00616-1","type":"journal-article","created":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T23:26:33Z","timestamp":1568935593000},"page":"397-417","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Toward an integrated dynamic defense system for strategic detecting attacks in cloud networks using stochastic game"],"prefix":"10.1007","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9293-9602","authenticated-orcid":false,"given":"El Mehdi","family":"Kandoussi","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Hanini","sequence":"additional","affiliation":[]},{"given":"Iman","family":"El Mir","sequence":"additional","affiliation":[]},{"given":"Abdelkrim","family":"Haqiq","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,20]]},"reference":[{"key":"616_CR1","unstructured":"Adili, M. T., Mohammadi, A., Manshaei, M. H., & Rahman, M. A. (2017). A cost-effective security management for clouds: A game-theoretic deception mechanism. In 2017 IFIP\/IEEE symposium on integrated network and service management (IM) (pp. 98\u2013106). New York: IEEE."},{"key":"616_CR2","unstructured":"Al-Shaer, E., Wei, J., Hamlen, K. W., & Wang, C (Eds.), (2019). Honeypot deception tactics. In Autonomous cyber deception (pp. 35\u201345). Berlin: Springer."},{"key":"616_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.comnet.2018.01.013","volume":"133","author":"A Arghavani","year":"2018","unstructured":"Arghavani, A., Arghavani, M., Ahmadi, M., & Crane, P. (2018). Attacker-manager game tree (AMGT): A new framework for visualizing and analysing the interactions between attacker and network security manager. Computer Networks, 133, 42\u201358.","journal-title":"Computer Networks"},{"key":"616_CR4","unstructured":"Azab, M., & Eltoweissy, M. (2016). Migrate: Towards a lightweight moving-target defense against cloud side-channels. In 2016 IEEE security and privacy workshops (SPW) (pp. 96\u2013103). New York: IEEE."},{"key":"616_CR5","unstructured":"Bar, A., Shapira, B., Rokach, L., & Unger, M. (2016). Identifying attack propagation patterns in honeypots using Markov chains modeling and complex networks analysis. In 2016 IEEE international conference on software science, technology and engineering (SWSTE) (pp. 28\u201336). New York: IEEE."},{"key":"616_CR6","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.jisa.2018.06.004","volume":"41","author":"M Baykara","year":"2018","unstructured":"Baykara, M., & Das, R. (2018). A novel honeypot based security approach for real-time intrusion detection and prevention systems. Journal of Information Security and Applications, 41, 103\u2013116.","journal-title":"Journal of Information Security and Applications"},{"key":"616_CR7","unstructured":"Beckery, S., Seibert, J., Zage, D., Nita-Rotaru, C., & Statey, R. (2011). Applying game theory to analyze attacks and defenses in virtual coordinate systems. In 2011 IEEE\/IFIP 41st international conference on dependable systems and networks (DSN) (pp. 133\u2013144). New York: IEEE."},{"key":"616_CR8","unstructured":"Beham, M., Vlad, M., & Reiser, H. P. (2013). Intrusion detection and honeypots in nested virtualization environments. In 2013 43rd annual IEEE\/IFIP international conference on dependable systems and networks (DSN) (pp. 1\u20136). New York: IEEE."},{"issue":"2","key":"616_CR9","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s11235-017-0395-z","volume":"68","author":"A Boulaiche","year":"2018","unstructured":"Boulaiche, A., & Adi, K. (2018). An auto-learning approach for network intrusion detection. Telecommunication Systems, 68(2), 277\u2013294.","journal-title":"Telecommunication Systems"},{"key":"616_CR10","unstructured":"Cai, G., Wang, B., Wang, X., Yuan, Y., & Li, S. (2016). An introduction to network address shuffling. In 2016 18th international conference on advanced communication technology (ICACT) (pp. 185\u2013190). New York: IEEE."},{"key":"616_CR11","unstructured":"Carroll, T. E., Crouse, M., Fulp, E. W., & Berenhaut, K. S. (2014). Analysis of network address shuffling as a moving target defense. In 2014 IEEE international conference on communications (ICC) (pp. 701\u2013706). New York: IEEE."},{"issue":"2","key":"616_CR12","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1177\/1548512917699725","volume":"15","author":"JH Cho","year":"2018","unstructured":"Cho, J. H., & Ben-Asher, N. (2018). Cyber defense in breadth: Modeling and analysis of integrated defense systems. The Journal of Defense Modeling and Simulation, 15(2), 147\u2013160.","journal-title":"The Journal of Defense Modeling and Simulation"},{"key":"616_CR13","doi-asserted-by":"crossref","unstructured":"Debroy, S., Calyam, P., Nguyen, M., Stage, A., & Georgiev, V. (2016). Frequency-minimal moving target defense using software-defined networking. In 2016 international conference on computing, networking and communications (ICNC) (pp. 1\u20136). EEE.","DOI":"10.1109\/ICCNC.2016.7440635"},{"key":"616_CR14","unstructured":"Dongxia, L., & Yongbo, Z. (2012). An intrusion detection system based on honeypot technology. In 2012 international conference on computer science and electronics engineering (Vol. 1, pp. 451\u2013454). New York: IEEE."},{"issue":"3","key":"616_CR15","first-page":"345","volume":"9","author":"I El Mir","year":"2017","unstructured":"El Mir, I., Kandoussi, E. M., Hanini, M., Haqiq, A., & Kim, D. S. (2017). A game theoretic approach based virtual machine migration for cloud environment security. International Journal of Communication Networks and Information Security, 9(3), 345\u2013357.","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"616_CR16","unstructured":"Kaaniche, M., Deswarte, Y., Alata, E., Dacier, M., & Nicomette, V. (2007). Empirical analysis and statistical modeling of attack processes based on honeypots. Preprint arXiv:0704.0861 ."},{"key":"616_CR17","unstructured":"Kamhoua, C.A., Kwiat, L., Kwiat, K.A., Park, J.S., Zhao, M., & Rodriguez, M. (2014). Game theoretic modeling of security and interdependency in a public cloud. In 2014 IEEE 7th international conference on cloud computing (pp. 514\u2013521). New York: IEEE."},{"key":"616_CR18","unstructured":"Kandoussi, E. M., El Mir, I., Hanini, M., & Haqiq, A. (2017). Modeling an anomaly-based intrusion prevention system using game theory. In International conference on innovations in bio-inspired computing and applications (pp. 266\u2013276). Berlin: Springer."},{"key":"616_CR19","doi-asserted-by":"publisher","unstructured":"Khan, M. E., & Khan, F., et al. (2012). A comparative study of white box, black box and grey box testing techniques. International Journal of Advanced Computer Science and Applications, https:\/\/doi.org\/10.14569\/IJACSA.2012.030603","DOI":"10.14569\/IJACSA.2012.030603"},{"issue":"5","key":"616_CR20","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/3232848","volume":"51","author":"C Kiennert","year":"2018","unstructured":"Kiennert, C., Ismail, Z., Debar, H., & Leneutre, J. (2018). A survey on game-theoretic approaches for intrusion detection and response optimization. ACM Computing Surveys (CSUR), 51(5), 90.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"616_CR21","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/ACCESS.2016.2633983","volume":"5","author":"C Lei","year":"2017","unstructured":"Lei, C., Ma, D. H., & Zhang, H. Q. (2017). Optimal strategy selection for moving target defense based on Markov game. IEEE Access, 5, 156\u2013169.","journal-title":"IEEE Access"},{"key":"616_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/6391502","volume":"2016","author":"Cheng Lei","year":"2016","unstructured":"Lei, C., Ma, D. H., Zhang, H. Q., & Wang, L. M. (2016). Moving target network defense effectiveness evaluation based on change-point detection. Mathematical Problems in Engineering, https:\/\/doi.org\/10.1155\/2016\/6391502","journal-title":"Mathematical Problems in Engineering"},{"key":"616_CR23","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.comcom.2017.12.001","volume":"116","author":"C Lei","year":"2018","unstructured":"Lei, C., Zhang, H. Q., Wan, L. M., Liu, L., & Ma, D. (2018). Incomplete information Markov game theoretic approach to strategy generation for moving target defense. Computer Communications, 116, 184\u2013199.","journal-title":"Computer Communications"},{"key":"616_CR24","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.comnet.2017.03.015","volume":"129","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Xu, C., Zhan, Y., Liu, Z., Guan, J., & Zhang, H. (2017). Incentive mechanism for computation offloading using edge computing: A stackelberg game approach. Computer Networks, 129, 399\u2013409.","journal-title":"Computer Networks"},{"key":"616_CR25","unstructured":"Maleki, H., Valizadeh, S., Koch, W., Bestavros, A., & van Dijk, M. (2016). Markov modeling of moving target defense games. In Proceedings of the 2016 ACM workshop on moving target defense (pp. 81\u201392). New York: ACM."},{"key":"616_CR26","first-page":"1","volume-title":"Moving Target Defense II","author":"Pratyusa K. Manadhata","year":"2012","unstructured":"Manadhata, P. K. (2013). Game theoretic approaches to attack surface shifting. In S. Jajodia, A. K. Ghosh, V.S. Subrahmanian, V. Swarup, C. Wang and X. S. Wang (Eds.), Moving target defense II (pp. 1\u201313). Berlin: Springer."},{"key":"616_CR27","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.comnet.2017.04.024","volume":"121","author":"MM Mehdi","year":"2017","unstructured":"Mehdi, M. M., Raza, I., & Hussain, S. A. (2017). A game theory based trust model for vehicular ad hoc networks (vanets). Computer Networks, 121, 152\u2013172.","journal-title":"Computer Networks"},{"issue":"3","key":"616_CR28","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s11416-016-0270-6","volume":"12","author":"HJ Mun","year":"2016","unstructured":"Mun, H. J., & Han, K. H. (2016). Blackhole attack: User identity and password seize attack using honeypot. Journal of Computer Virology and Hacking Techniques, 12(3), 185\u2013190.","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"616_CR29","unstructured":"Ou, X., Govindavajhala, S., & Appel, A. W. (2005). MulVAL: A logic-based network security analyzer. In USENIX security symposium (Vol. 8, pp. 113\u2013128). Baltimore, MD."},{"key":"616_CR30","unstructured":"Sheyner, O., & Wing, J. (2003). Tools for generating and analyzing attack graphs. In International symposium on formal methods for components and objects (pp. 344\u2013371). Berlin: Springer."},{"key":"616_CR31","doi-asserted-by":"crossref","unstructured":"Speicher, P., Steinmetz, M., Backes, M., Hoffmann, J., & K\u00fcnnemann, R. (2018). Stackelberg planning: Towards effective leader\u2013follower state space search. In 32nd AAAI conference on artificial intelligence.","DOI":"10.1609\/aaai.v32i1.12090"},{"key":"616_CR32","unstructured":"Thongthua, A., & Ngamsuriyaroj, S. (2016). Assessment of hypervisor vulnerabilities. In 2016 International conference on cloud computing research and innovations (ICCCRI) (pp. 71\u201377). New York: IEEE."},{"key":"616_CR33","unstructured":"Venkatesan, S., Albanese, M., Amin, K., Jajodia, S., & Wright, M. (2016). A moving target defense approach to mitigate DDoS attacks against proxy-based architectures. In 2016 IEEE conference on communications and network security (CNS) (pp. 198\u2013206). New York: IEEE."},{"issue":"5","key":"616_CR34","doi-asserted-by":"publisher","first-page":"2474","DOI":"10.1109\/TSG.2017.2670144","volume":"8","author":"K Wang","year":"2017","unstructured":"Wang, K., Du, M., Maharjan, S., & Sun, Y. (2017). Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Transactions on Smart Grid, 8(5), 2474\u20132482.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"616_CR35","unstructured":"Yusoh, Z. I. M., & Tang, M. (2010). A penalty-based genetic algorithm for the composite SaaS placement problem in the cloud. In IEEE congress on evolutionary computation (pp. 1\u20138). New York: IEEE."},{"issue":"4","key":"616_CR36","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1109\/TMC.2018.2847337","volume":"18","author":"J Zheng","year":"2018","unstructured":"Zheng, J., Cai, Y., Wu, Y., & Shen, X. (2018). Dynamic computation offloading for mobile cloud computing: A stochastic game-theoretic approach. IEEE Transactions on Mobile Computing, 18(4), 771\u2013786.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"616_CR37","unstructured":"Zheng, J., & Siami Namin, A. (2018). A Markov decision process to determine optimal policies in moving target. In Proceedings of the 2018 ACM SIGSAC conference on computer and communications security (pp. 2321\u20132323). New York: ACM."},{"key":"616_CR38","unstructured":"Zhu, Q., & Ba\u015far, T. (2013). Game-theoretic approach to feedback-driven multi-stage moving target defense. In International conference on decision and game theory for security (pp. 246\u2013263). Berlin: Springer."},{"key":"616_CR39","unstructured":"Zhuang, R., DeLoach, S. A., & Ou, X. (2014). Towards a theory of moving target defense. In Proceedings of the 1st ACM workshop on moving target defense (pp. 31\u201340). New York: ACM."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-019-00616-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-019-00616-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-019-00616-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T02:51:37Z","timestamp":1664419897000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-019-00616-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,20]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["616"],"URL":"https:\/\/doi.org\/10.1007\/s11235-019-00616-1","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[2019,9,20]]},"assertion":[{"value":"20 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}