{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:57Z","timestamp":1750221237761,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3268966.3268970","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"31-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Catch Me If You Can"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Fraunholz","sequence":"first","affiliation":[{"name":"German Research Center for Artificial Intelligence, Kaiserslautern, Germany"}]},{"given":"Daniel","family":"Krohmer","sequence":"additional","affiliation":[{"name":"German Research Center for Artificial Intelligence, Kaiserslautern, Germany"}]},{"given":"Simon","family":"Duque Anton","sequence":"additional","affiliation":[{"name":"German Research Center for Artificial Intelligence, Kaiserslautern, Germany"}]},{"given":"Hans Dieter","family":"Schotten","sequence":"additional","affiliation":[{"name":"German Research Center for Artificial Intelligence, Kaiserslautern, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"volume-title":"Proceedings of the International Conference on Security and Privacy in Communication Systems","year":"2012","author":"Al-Shaer Ehab","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103626.1103633"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEPEND.2009.15"},{"key":"e_1_3_2_1_4_1","unstructured":"John B. Bell and Barton Whaley. 1991. Cheating and deception repr ed.). Transaction Publ New Brunswick.  John B. Bell and Barton Whaley. 1991. Cheating and deception repr ed.). Transaction Publ New Brunswick."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Mihir Bellare Ran Canetti and Hugo Krawczyk. 1996. Keying Hash Functions for Message Authentication. Advances in Cryptology (1996) 1--15.   Mihir Bellare Ran Canetti and Hugo Krawczyk. 1996. Keying Hash Functions for Message Authentication. Advances in Cryptology (1996) 1--15.","DOI":"10.1007\/3-540-68697-5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"Gilberto Bertin. 2016. Introducing the p0f BPF compiler. https:\/\/blog.cloudflare.com\/introducing-the-p0f-bpf-compiler\/  Gilberto Bertin. 2016. Introducing the p0f BPF compiler. https:\/\/blog.cloudflare.com\/introducing-the-p0f-bpf-compiler\/"},{"key":"e_1_3_2_1_7_1","unstructured":"Stephen W.Stephen W.Boyd Boyd and Angelos D.Angelos D.Keromytis Keromytis. {n. d.}. SQLrand: Preventing SQL Injection Attacks. ({n. d.}).  Stephen W.Stephen W.Boyd Boyd and Angelos D.Angelos D.Keromytis Keromytis. {n. d.}. SQLrand: Preventing SQL Injection Attacks. ({n. d.})."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2016.7423321"},{"key":"e_1_3_2_1_9_1","unstructured":"Monica Chew and Dawn Song. 2003. Mitigating Buer Over ows by Operating System Randomization. (2003).  Monica Chew and Dawn Song. 2003. Mitigating Buer Over ows by Operating System Randomization. (2003)."},{"key":"e_1_3_2_1_10_1","unstructured":"CIRT. 2001. Nikto2. https:\/\/cirt.net\/Nikto2  CIRT. 2001. Nikto2. https:\/\/cirt.net\/Nikto2"},{"key":"e_1_3_2_1_11_1","volume-title":"Phrack Inc.","volume":"11","author":"Corey J.","year":"2003"},{"volume-title":"2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG) . IEEE, 1--7.","author":"Crouse Michael","key":"e_1_3_2_1_12_1"},{"volume-title":"Proceedings of the National Symposium on Moving Target Research","year":"2012","author":"Crouse Michael","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808480"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127486"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.28"},{"key":"e_1_3_2_1_18_1","volume-title":"Two Decades of SCADA Exploitation: A Brief History. Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems","volume":"3","author":"Anton Simon Duque","year":"2017"},{"key":"e_1_3_2_1_19_1","unstructured":"erwan_Ir FireFart and ethicalhack3r. 2018. WPScan. wpscan.org  erwan_Ir FireFart and ethicalhack3r. 2018. WPScan. wpscan.org"},{"key":"e_1_3_2_1_20_1","unstructured":"Europol. 2016. Internet Organized Crime Threat Assessment. https:\/\/www.europol.europa.eu\/activities-services\/main-reports\/internet-organised-crime-threat-assessment-iocta-2016  Europol. 2016. Internet Organized Crime Threat Assessment. https:\/\/www.europol.europa.eu\/activities-services\/main-reports\/internet-organised-crime-threat-assessment-iocta-2016"},{"volume-title":"Distraction and Obfuscation. International Conference on Computing, Networking and Communications","year":"2018","author":"Fraunholz Daniel","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","volume-title":"Deployment and Maintenance Strategy. International Conference on Advanced Communications Technology. International Conference on Advanced Communications Technology","volume":"19","author":"Fraunholz Daniel","year":"2017"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Daniel Fraunholz Marc Zimmermann and Hans Dieter Schotten. 2017b. Towards Deployment Strategies for Deception Systems. Advances in Science Technology and Engineering Systems Journal Vol. Special Issue on Recent Advances in Engineering Systems (2017).  Daniel Fraunholz Marc Zimmermann and Hans Dieter Schotten. 2017b. Towards Deployment Strategies for Deception Systems. Advances in Science Technology and Engineering Systems Journal Vol. Special Issue on Recent Advances in Engineering Systems (2017).","DOI":"10.25046\/aj0203161"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808484"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140549.3140555"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140549.3140551"},{"volume-title":"Workshop on Information Assurance and Security","year":"2005","author":"Holz T.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.1.5.21-30"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_8"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218443"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663483"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614155"},{"volume-title":"RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. In 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS","year":"2007","author":"Jiang Xuxian","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598394.2605437"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_10"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602087.2602100"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.383"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808485"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(03)00146-8"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140549.3140559"},{"key":"e_1_3_2_1_42_1","unstructured":"A. Ofir and F. Yarochkin. 2003. Xprobe2 - A Fuzzy Approach to Remote Active Operating System Fingerprinting. (2003).  A. Ofir and F. Yarochkin. 2003. Xprobe2 - A Fuzzy Approach to Remote Active Operating System Fingerprinting. (2003)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2012.01.002"},{"volume-title":"Research in Attacks, Intrusions and Defenses, Angelos Stavrou, Herbert Bos, and Georgios Portokalidis (Eds.)","series-title":"Lecture Notes in Computer Science","author":"Okhravi Hamed","key":"e_1_3_2_1_44_1"},{"key":"e_1_3_2_1_45_1","unstructured":"OWASP. 2008. Dirbuster Project. https:\/\/www.owasp.org\/index.php\/Category:OWASP_DirBuster_Project  OWASP. 2008. Dirbuster Project. https:\/\/www.owasp.org\/index.php\/Category:OWASP_DirBuster_Project"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.01.039"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym10010014"},{"key":"e_1_3_2_1_48_1","unstructured":"Vince Reynolds. 2015. Social engineering: The art of psychological warfare human hacking persuation & deception .CreateSpace {Place of publication not identified}.  Vince Reynolds. 2015. Social engineering: The art of psychological warfare human hacking persuation & deception .CreateSpace {Place of publication not identified}."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140549.3140553"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140549.3140560"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.1"},{"volume-title":"Workshop on Compiler and Architectural Techniques for Application Reliability and Security","year":"2008","author":"Salamat Babak","key":"e_1_3_2_1_52_1"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.18"},{"key":"e_1_3_2_1_54_1","unstructured":"Swiss Government Computer Emergency Response Team. 2017. Sage 2.0 comes with IP Generation Algorithm (IPGA).  Swiss Government Computer Emergency Response Team. 2017. Sage 2.0 comes with IP Generation Algorithm (IPGA)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Joni Uitto Sampsa Rauti Samuel Lauren and Ville Lepp\"anen. 2017. A Survey on Anti-honeypot and Anti-introspection Methods. Recent Advances in Information Systems and Technologies (2017) 125--134.  Joni Uitto Sampsa Rauti Samuel Lauren and Ville Lepp\"anen. 2017. A Survey on Anti-honeypot and Anti-introspection Methods. Recent Advances in Information Systems and Technologies (2017) 125--134.","DOI":"10.1007\/978-3-319-56538-5_13"},{"key":"e_1_3_2_1_56_1","article-title":"The Art of Port Scanning","volume":"7","author":"Vaskovich Fyodor","year":"1997","journal-title":"Phrack Magazine"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2015.31"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663486"},{"key":"e_1_3_2_1_59_1","unstructured":"M. Zalewski. 2012. p0f v3: Passive fingerprinter. (2012).  M. Zalewski. 2012. p0f v3: Passive fingerprinter. (2012)."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 5th ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3268966.3268970","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3268966.3268970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:20Z","timestamp":1750212440000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3268966.3268970"}},"subtitle":["Dynamic Concealment of Network Entities"],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":59,"alternative-id":["10.1145\/3268966.3268970","10.1145\/3268966"],"URL":"https:\/\/doi.org\/10.1145\/3268966.3268970","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}