{"id":"https://openalex.org/W3083350651","doi":"https://doi.org/10.1109/tetc.2022.3155272","title":"Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud","display_name":"Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud","publication_year":2022,"publication_date":"2022-03-14","ids":{"openalex":"https://openalex.org/W3083350651","doi":"https://doi.org/10.1109/tetc.2022.3155272","mag":"3083350651"},"language":"en","primary_location":{"id":"doi:10.1109/tetc.2022.3155272","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2022.3155272","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012892246","display_name":"Hooman Alavizadeh","orcid":null},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Hooman Alavizadeh","raw_affiliation_strings":["UNSW Institute for Cyber Security, University of New South Wales, Canberra, Campbell, Australia"],"affiliations":[{"raw_affiliation_string":"UNSW Institute for Cyber Security, University of New South Wales, Canberra, Campbell, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067809445","display_name":"Samin Aref","orcid":"https://orcid.org/0000-0002-5870-9253"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]},{"id":"https://openalex.org/I4210120395","display_name":"Max Planck Institute for Demographic Research","ror":"https://ror.org/02jgyam08","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210120395"]}],"countries":["CA","DE"],"is_corresponding":false,"raw_author_name":"Samin Aref","raw_affiliation_strings":["Department of Mechanical and Industrial Engineering, University of Torontor, Toronto, ON, Canada","Max Planck Institute for Demographic Research, Rostock, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Mechanical and Industrial Engineering, University of Torontor, Toronto, ON, Canada","institution_ids":["https://openalex.org/I185261750"]},{"raw_affiliation_string":"Max Planck Institute for Demographic Research, Rostock, Germany","institution_ids":["https://openalex.org/I4210120395"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019789320","display_name":"Dong Seong Kim","orcid":"https://orcid.org/0000-0003-2605-187X"},"institutions":[{"id":"https://openalex.org/I165143802","display_name":"The University of Queensland","ror":"https://ror.org/00rqy9422","country_code":"AU","type":"education","lineage":["https://openalex.org/I165143802"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dong Seong Kim","raw_affiliation_strings":["School of Information Technology and Electrical Engineering, University of Queensland, St Lucia, QLD, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Electrical Engineering, University of Queensland, St Lucia, QLD, Australia","institution_ids":["https://openalex.org/I165143802"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007979944","display_name":"Julian Jang\u2010Jaccard","orcid":"https://orcid.org/0000-0002-1002-057X"},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Julian Jang-Jaccard","raw_affiliation_strings":["Cybersecurity Laboratory, Massey University, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Laboratory, Massey University, Auckland, New Zealand","institution_ids":["https://openalex.org/I51158804"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5012892246"],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":5.0882,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.95521372,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"10","issue":"4","first_page":"1772","last_page":"1788"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8648182153701782},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8278355002403259},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.6254874467849731},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.5895986557006836},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5484125018119812},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5369894504547119},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.47776901721954346},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4468298852443695},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.42578524351119995},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4158657491207123},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11771324276924133}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8648182153701782},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8278355002403259},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.6254874467849731},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.5895986557006836},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5484125018119812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5369894504547119},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.47776901721954346},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4468298852443695},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.42578524351119995},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4158657491207123},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11771324276924133},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tetc.2022.3155272","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2022.3155272","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W58080111","https://openalex.org/W599836493","https://openalex.org/W1543639048","https://openalex.org/W1612694023","https://openalex.org/W1952698709","https://openalex.org/W1964202794","https://openalex.org/W1969723516","https://openalex.org/W1973602358","https://openalex.org/W1984382557","https://openalex.org/W1995327224","https://openalex.org/W1999588868","https://openalex.org/W2015658478","https://openalex.org/W2049973206","https://openalex.org/W2056075452","https://openalex.org/W2063524226","https://openalex.org/W2069767177","https://openalex.org/W2076199095","https://openalex.org/W2077937403","https://openalex.org/W2086454935","https://openalex.org/W2090650780","https://openalex.org/W2149137922","https://openalex.org/W2149327697","https://openalex.org/W2160372331","https://openalex.org/W2178447779","https://openalex.org/W2213283130","https://openalex.org/W2293796414","https://openalex.org/W2388109147","https://openalex.org/W2407002705","https://openalex.org/W2418927766","https://openalex.org/W2515955240","https://openalex.org/W2534481600","https://openalex.org/W2553733554","https://openalex.org/W2590674259","https://openalex.org/W2599777545","https://openalex.org/W2610881571","https://openalex.org/W2726907491","https://openalex.org/W2784170551","https://openalex.org/W2889979954","https://openalex.org/W2896778311","https://openalex.org/W2971249320","https://openalex.org/W2988164393","https://openalex.org/W2996903041","https://openalex.org/W3006537789","https://openalex.org/W3016437435","https://openalex.org/W3097543155","https://openalex.org/W3097981465","https://openalex.org/W3130991947","https://openalex.org/W3150624049","https://openalex.org/W4285719527","https://openalex.org/W6602320810","https://openalex.org/W6682933086","https://openalex.org/W6685264840","https://openalex.org/W6714052884","https://openalex.org/W6773697140"],"related_works":["https://openalex.org/W2931996793","https://openalex.org/W4205234238","https://openalex.org/W572531444","https://openalex.org/W2921575628","https://openalex.org/W2788934790","https://openalex.org/W3167767780","https://openalex.org/W3148880067","https://openalex.org/W4205923274","https://openalex.org/W3043682580","https://openalex.org/W2174174426"],"abstract_inverted_index":{"Moving":[0],"Target":[1],"Defense":[2],"(MTD)":[3],"is":[4],"a":[5,120,125,147,157,195],"proactive":[6],"security":[7,29,61,88,140],"mechanism":[8],"that":[9,204],"changes":[10],"the":[11,15,27,53,74,104,107,133,136,152,168,178,185,202,206],"attack":[12,94],"surface":[13],"with":[14,58],"aim":[16],"of":[17,52,55,76,106,135],"confusing":[18],"attackers.":[19],"Cloud":[20],"computing":[21],"leverages":[22],"MTD":[23,36,56,78,109,137,154,170],"techniques":[24,37,57,110,138],"to":[25,41,60,102,112,131,149,166,200],"enhance":[26],"cloud":[28,42,114,126],"posture":[30],"against":[31],"cyber":[32],"threats.":[33],"While":[34],"many":[35],"have":[38],"been":[39,48],"applied":[40,111],"computing,":[43],"there":[44],"has":[45],"so":[46],"far":[47],"no":[49],"joint":[50],"evaluation":[51],"effectiveness":[54,105,134],"respect":[59],"and":[62,82,99,141,162,191],"economic":[63,142],"metrics.":[64,143],"In":[65],"this":[66],"paper,":[67],"we":[68,85,117,183],"first":[69],"introduce":[70,145],"mathematical":[71],"definitions":[72],"for":[73,128],"combination":[75],"three":[77],"techniques:":[79],"Shuffle,":[80],"Diversity,":[81],"Redundancy.":[83],"Then,":[84],"utilize":[86],"four":[87],"metrics":[89],"\u2013":[90,101],"namely,":[91],"system":[92,174],"risk,":[93],"cost,":[95],"return":[96],"on":[97,119,124],"attack,":[98],"reliability":[100],"assess":[103],"combined":[108],"large-scale":[113],"models.":[115],"Second,":[116],"focus":[118],"specific":[121],"context":[122],"based":[123],"model":[127,199],"e-health":[129],"applications":[130],"evaluate":[132],"using":[139,156],"We":[144],"(1)":[146],"strategy":[148],"effectively":[150],"deploy":[151,167],"Shuffle":[153],"technique":[155,171,180],"virtual":[158],"machine":[159],"placement":[160],"technique,":[161],"(2)":[163],"two":[164],"strategies":[165],"Diversity":[169,179],"through":[172],"operating":[173],"diversification.":[175],"As":[176],"deploying":[177],"incurs":[181],"costs,":[182],"formulate":[184],"optimal":[186],"diversity":[187],"assignment":[188,203],"problem":[189],"(O-DAP),":[190],"solve":[192],"it":[193],"as":[194],"binary":[196],"linear":[197],"programming":[198],"obtain":[201],"maximizes":[205],"expected":[207],"net":[208],"benefit.":[209]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
