{"id":"https://openalex.org/W4389313009","doi":"https://doi.org/10.1109/nfv-sdn59219.2023.10329594","title":"MERLINS \u2013 Moving Target Defense Enhanced with Deep-RL for NFV In-Depth Security","display_name":"MERLINS \u2013 Moving Target Defense Enhanced with Deep-RL for NFV In-Depth Security","publication_year":2023,"publication_date":"2023-11-07","ids":{"openalex":"https://openalex.org/W4389313009","doi":"https://doi.org/10.1109/nfv-sdn59219.2023.10329594"},"language":"en","primary_location":{"id":"doi:10.1109/nfv-sdn59219.2023.10329594","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nfv-sdn59219.2023.10329594","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://www.zora.uzh.ch/id/eprint/255612/1/2023_Soussi_etal_MERLINS_NFV_security_IEEESDNNFV_1.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090025398","display_name":"Wissem Soussi","orcid":"https://orcid.org/0000-0001-7493-4816"},"institutions":[{"id":"https://openalex.org/I858936495","display_name":"ZHAW Zurich University of Applied Sciences","ror":"https://ror.org/05pmsvm27","country_code":"CH","type":"education","lineage":["https://openalex.org/I858936495"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Wissem Soussi","raw_affiliation_strings":["University of Z&#x00FC;rich UZH,Switzerland","Zurich University of Applied Sciences, Switzerland"],"affiliations":[{"raw_affiliation_string":"University of Z&#x00FC;rich UZH,Switzerland","institution_ids":[]},{"raw_affiliation_string":"Zurich University of Applied Sciences, Switzerland","institution_ids":["https://openalex.org/I858936495"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015018091","display_name":"Maria Christopoulou","orcid":"https://orcid.org/0000-0001-7062-6146"},"institutions":[{"id":"https://openalex.org/I203474044","display_name":"National Centre of Scientific Research \"Demokritos\"","ror":"https://ror.org/038jp4m40","country_code":"GR","type":"facility","lineage":["https://openalex.org/I203474044"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Maria Christopoulou","raw_affiliation_strings":["National Center for Scientific Research Demokritos (NCSRD),Greece","National Center for Scientific Research Demokritos (NCSRD), Greece"],"affiliations":[{"raw_affiliation_string":"National Center for Scientific Research Demokritos (NCSRD),Greece","institution_ids":["https://openalex.org/I203474044"]},{"raw_affiliation_string":"National Center for Scientific Research Demokritos (NCSRD), Greece","institution_ids":["https://openalex.org/I203474044"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018779142","display_name":"G\u00fcrkan G\u00fcr","orcid":"https://orcid.org/0000-0002-3105-4904"},"institutions":[{"id":"https://openalex.org/I858936495","display_name":"ZHAW Zurich University of Applied Sciences","ror":"https://ror.org/05pmsvm27","country_code":"CH","type":"education","lineage":["https://openalex.org/I858936495"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"G\u00fcrkan G\u00fcr","raw_affiliation_strings":["Zurich University of Applied Sciences,Switzerland","Zurich University of Applied Sciences, Switzerland"],"affiliations":[{"raw_affiliation_string":"Zurich University of Applied Sciences,Switzerland","institution_ids":["https://openalex.org/I858936495"]},{"raw_affiliation_string":"Zurich University of Applied Sciences, Switzerland","institution_ids":["https://openalex.org/I858936495"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033030418","display_name":"Burkhard Stiller","orcid":"https://orcid.org/0000-0002-7461-7463"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Burkhard Stiller","raw_affiliation_strings":["University of Z&#x00FC;rich UZH,Switzerland"],"affiliations":[{"raw_affiliation_string":"University of Z&#x00FC;rich UZH,Switzerland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5090025398"],"corresponding_institution_ids":["https://openalex.org/I858936495"],"apc_list":null,"apc_paid":null,"fwci":2.1958,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.88739653,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"65","last_page":"71"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.8705195784568787},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8003371953964233},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7422597408294678},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6031516194343567},{"id":"https://openalex.org/keywords/markov-decision-process","display_name":"Markov decision process","score":0.6007193922996521},{"id":"https://openalex.org/keywords/network-functions-virtualization","display_name":"Network Functions Virtualization","score":0.590814471244812},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.562452495098114},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4619292616844177},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.45124173164367676},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.43255114555358887},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.43236929178237915},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.423678994178772},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.41960012912750244},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4164121150970459},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38529831171035767},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34702932834625244},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.31901881098747253},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2533223330974579},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13196268677711487}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.8705195784568787},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8003371953964233},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7422597408294678},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6031516194343567},{"id":"https://openalex.org/C106189395","wikidata":"https://www.wikidata.org/wiki/Q176789","display_name":"Markov decision process","level":3,"score":0.6007193922996521},{"id":"https://openalex.org/C200789330","wikidata":"https://www.wikidata.org/wiki/Q7000834","display_name":"Network Functions Virtualization","level":3,"score":0.590814471244812},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.562452495098114},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4619292616844177},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.45124173164367676},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.43255114555358887},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43236929178237915},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.423678994178772},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.41960012912750244},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4164121150970459},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38529831171035767},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34702932834625244},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.31901881098747253},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2533223330974579},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13196268677711487},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C111368507","wikidata":"https://www.wikidata.org/wiki/Q43518","display_name":"Oceanography","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/nfv-sdn59219.2023.10329594","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nfv-sdn59219.2023.10329594","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","raw_type":"proceedings-article"},{"id":"pmh:oai:www.zora.uzh.ch:255612","is_oa":true,"landing_page_url":"https://www.zora.uzh.ch/id/eprint/255612/1/2023_Soussi_etal_MERLINS_NFV_security_IEEESDNNFV_1.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401281","display_name":"Zurich Open Repository and Archive (University of Zurich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I202697423","host_organization_name":"University of Zurich","host_organization_lineage":["https://openalex.org/I202697423"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Soussi, Wissem; Christopoulou, Maria; G\u00fcr, G\u00fcrkan; Stiller, Burkhard  (2023). MERLINS \u2013 Moving Target Defense Enhanced with Deep-RL for NFV In-Depth Security.  In: 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Dresden, Germany, 7 November 2023 - 9 November 2023. Institute of Electrical and Electronics Engineers, 65-71.","raw_type":"info:eu-repo/semantics/acceptedVersion"},{"id":"pmh:doi:10.5167/uzh-255612","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Text"},{"id":"pmh:oai:digitalcollection.zhaw.ch:11475/29467","is_oa":true,"landing_page_url":"https://hdl.handle.net/11475/29467","pdf_url":null,"source":{"id":"https://openalex.org/S4306401810","display_name":"Z\u00fcrcher Hochschule f\u00fcr Angewandte Wissenschaften digital collection (Zurich University of Applied Sciences)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200744771","host_organization_name":"ZHAW Zurich University of Applied Sciences","host_organization_lineage":["https://openalex.org/I200744771"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Text"},{"id":"doi:10.5167/uzh-255612","is_oa":true,"landing_page_url":"https://doi.org/10.5167/uzh-255612","pdf_url":null,"source":{"id":"https://openalex.org/S7407051291","display_name":"Universit\u00e4t Z\u00fcrich, ZORA","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":""}],"best_oa_location":{"id":"pmh:oai:www.zora.uzh.ch:255612","is_oa":true,"landing_page_url":"https://www.zora.uzh.ch/id/eprint/255612/1/2023_Soussi_etal_MERLINS_NFV_security_IEEESDNNFV_1.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401281","display_name":"Zurich Open Repository and Archive (University of Zurich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I202697423","host_organization_name":"University of Zurich","host_organization_lineage":["https://openalex.org/I202697423"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Soussi, Wissem; Christopoulou, Maria; G\u00fcr, G\u00fcrkan; Stiller, Burkhard  (2023). MERLINS \u2013 Moving Target Defense Enhanced with Deep-RL for NFV In-Depth Security.  In: 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Dresden, Germany, 7 November 2023 - 9 November 2023. Institute of Electrical and Electronics Engineers, 65-71.","raw_type":"info:eu-repo/semantics/acceptedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1999588868","https://openalex.org/W2086454935","https://openalex.org/W2145339207","https://openalex.org/W2605961225","https://openalex.org/W2612074600","https://openalex.org/W2615459164","https://openalex.org/W2736601468","https://openalex.org/W2762414772","https://openalex.org/W2903945215","https://openalex.org/W2964043796","https://openalex.org/W2969489701","https://openalex.org/W2981452619","https://openalex.org/W3019358501","https://openalex.org/W3027341120","https://openalex.org/W3068817550","https://openalex.org/W3081473382","https://openalex.org/W3084824572","https://openalex.org/W3183514509","https://openalex.org/W3206615547","https://openalex.org/W3216772467","https://openalex.org/W4381745013","https://openalex.org/W6692846177","https://openalex.org/W6741002519","https://openalex.org/W6766952794","https://openalex.org/W6768907644","https://openalex.org/W6780559895","https://openalex.org/W6782628559"],"related_works":["https://openalex.org/W2167596916","https://openalex.org/W2496445523","https://openalex.org/W4233730885","https://openalex.org/W2606106394","https://openalex.org/W3169265188","https://openalex.org/W2267484144","https://openalex.org/W2979258331","https://openalex.org/W2461440407","https://openalex.org/W3148545455","https://openalex.org/W2309305620"],"abstract_inverted_index":{"Moving":[0,31],"to":[1,17,68,133],"a":[2,26,56,85,128,134],"multi-cloud":[3],"environment":[4],"and":[5,9,38,78,98],"service-based":[6],"architecture,":[7],"5G":[8,86],"future":[10],"6G":[11],"networks":[12,48],"require":[13],"additional":[14],"defensive":[15],"mechanisms":[16],"protect":[18],"virtualized":[19],"network":[20,42,76],"resources.":[21],"This":[22,125],"paper":[23],"presents":[24],"MERLINS,":[25],"novel":[27],"architecture":[28],"generating":[29],"optimal":[30],"Target":[32],"Defense":[33],"(MTD)":[34],"policies":[35],"for":[36,144],"proactive":[37],"reactive":[39],"security":[40],"of":[41,95,122,130],"slices.":[43],"By":[44],"formally":[45],"modeling":[46],"telecommunication":[47],"compliant":[49],"with":[50],"Network":[51],"Function":[52],"Virtualization":[53],"(NFV)":[54],"into":[55],"multi-objective":[57,109],"Markov":[58],"Decision":[59],"Process":[60],"(MOMDP),":[61],"MERLINS":[62],"uses":[63],"deep":[64],"Reinforcement":[65],"Learning":[66],"(deep-RL)":[67],"optimize":[69],"the":[70,89,99,119,123,139,145],"MTD":[71,96,136],"strategy":[72],"that":[73,108,117],"considers":[74],"security,":[75],"performance,":[77],"service":[79],"level":[80],"requirements.":[81],"Practical":[82],"experiments":[83],"on":[84],"testbed":[87],"showcase":[88],"feasibility":[90],"as":[91,93],"well":[92],"restrictions":[94],"operations":[97],"effectiveness":[100],"in":[101],"mitigating":[102],"malware":[103],"infections.":[104],"It":[105],"is":[106],"observed":[107],"RL":[110],"(MORL)":[111],"algorithms":[112,116],"outperform":[113],"state-of-the-art":[114],"deep-RL":[115],"scalarize":[118],"reward":[120],"vector":[121],"MOMDP.":[124],"improvement":[126],"by":[127],"factor":[129],"two":[131],"leads":[132],"better":[135],"policy":[137],"than":[138],"baseline":[140],"static":[141],"counterpart":[142],"used":[143],"evaluation.":[146]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":5}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
