{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:10:06Z","timestamp":1771697406203,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ARO","award":["W911NF-15-1-0262"],"award-info":[{"award-number":["W911NF-15-1-0262"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1524462"],"award-info":[{"award-number":["CNS-1524462"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2995272.2995281","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"15-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks"],"prefix":"10.1145","author":[{"given":"Huangxin","family":"Wang","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Fei","family":"Li","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Songqing","family":"Chen","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Calculate your DDoS attack costs. https:\/\/www.neustar.biz\/resources\/tools\/ddos-attack-cost-calculator."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/www.openstack.org\/","year":"2015","unstructured":"Openstack. https:\/\/www.openstack.org\/, 2015."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36883-7_19"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.30"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/070710111"},{"key":"e_1_3_2_1_6_1","volume-title":"moving-target defense for enterprise network security. Models@run.time, 8378:137--161","author":"DeLoach A.","year":"2014","unstructured":"ScottA. DeLoach, Xinming Ou, Rui Zhuang, and Su Zhang. Model-driven, moving-target defense for enterprise network security. Models@run.time, 8378:137--161, 2014."},{"key":"e_1_3_2_1_7_1","volume-title":"What does network downtime & latency cost your business? http:\/\/www.ecessa.com\/blog\/downtime-costs\/","author":"ECESSA.","year":"2014","unstructured":"ECESSA. What does network downtime & latency cost your business? http:\/\/www.ecessa.com\/blog\/downtime-costs\/, 2014."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218442"},{"key":"e_1_3_2_1_9_1","volume-title":"Vmware vsphere 6. https:\/\/www.vmware.com\/products\/vsphere","author":"VMware Inc.","year":"2015","unstructured":"VMware Inc. Vmware vsphere 6. https:\/\/www.vmware.com\/products\/vsphere, 2015."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218443"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.35"},{"key":"e_1_3_2_1_12_1","first-page":"1882","volume-title":"Proceedings of the 2004 IEEE International Conference on Communications","volume":"4","author":"Jin Shuyuan","year":"2004","unstructured":"Shuyuan Jin and D. S. Yeung. A covariance analysis model for ddos attack detection. In Proceedings of the 2004 IEEE International Conference on Communications, volume 4, pages 1882--1886, 2004."},{"key":"e_1_3_2_1_13_1","first-page":"321","volume-title":"Proceedings of the International Conference on Security and Cryptograph (SECRYPT)","author":"Li Min","year":"2012","unstructured":"Min Li, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu, and Xubin He. Improving cloud survivability through dependency based virtual machine placement. In Proceedings of the International Conference on Security and Cryptograph (SECRYPT), pages 321--326, 2012."},{"key":"e_1_3_2_1_14_1","unstructured":"Tim Matthews. Incapsula survey : What DDoS attacks really cost businesses. http:\/\/lp.incapsula.com\/rs\/incapsulainc\/images\/eBook%20-%20DDoS%20Impact%20Survey.pdf 2014."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813706"},{"key":"e_1_3_2_1_16_1","unstructured":"Department of Homeland Security. Moving target defense. http:\/\/www.dhs.gov\/science-and-technology\/csd-mtd 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.133"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_19_1","volume-title":"Introduction to Probability Models","author":"Ross Sheldon M.","year":"1972","unstructured":"Sheldon M. Ross. Introduction to Probability Models, 1972."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894166.1894170"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2014.6900086"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAC.2014.35"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831201"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.47"},{"issue":"10","key":"e_1_3_2_1_25_1","first-page":"21","article-title":"A moving target DDoS defense mechanism","volume":"46","author":"Wang Huangxin","year":"2014","unstructured":"Huangxin Wang, Quan Jia, Dan Fleck, Walter Powell, Fei Li, and Angelos Stavrou. A moving target DDoS defense mechanism. Computer Communications, 46:10 -- 21, 2014.","journal-title":"Computer Communications"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.8"},{"key":"e_1_3_2_1_27_1","volume-title":"Adaptive attacker strategy development against moving target cyber defenses. CoRR, abs\/1407.8540","author":"Winterrose Michael L.","year":"2014","unstructured":"Michael L. Winterrose, Kevin M. Carter, N. Wagner, and William W. Streilein. Adaptive attacker strategy development against moving target cyber defenses. CoRR, abs\/1407.8540, 2014."},{"key":"e_1_3_2_1_28_1","unstructured":"Wolfram Research Inc. Mathematica 8.0."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831202"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.31"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808478"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602087.2602088"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2995272.2995281","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2995272.2995281","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2995272.2995281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:47:32Z","timestamp":1763459252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2995272.2995281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":32,"alternative-id":["10.1145\/2995272.2995281","10.1145\/2995272"],"URL":"https:\/\/doi.org\/10.1145\/2995272.2995281","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}