{"id":"https://openalex.org/W2535017274","doi":"https://doi.org/10.1145/2995272.2995279","title":"Moving Target Defense against DDoS Attacks","display_name":"Moving Target Defense against DDoS Attacks","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2535017274","doi":"https://doi.org/10.1145/2995272.2995279","mag":"2535017274"},"language":"en","primary_location":{"id":"doi:10.1145/2995272.2995279","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2995272.2995279","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2995272.2995279?download=true","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/2995272.2995279?download=true","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032253953","display_name":"Mason Wright","orcid":null},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mason Wright","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109412228","display_name":"Sridhar Venkatesan","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sridhar Venkatesan","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066709657","display_name":"Massimiliano Albanese","orcid":"https://orcid.org/0000-0002-2675-5810"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Massimiliano Albanese","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002102744","display_name":"Michael P. Wellman","orcid":"https://orcid.org/0000-0002-1691-6844"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael P. Wellman","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032253953"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":null,"apc_paid":null,"fwci":5.0203,"has_fulltext":true,"cited_by_count":36,"citation_normalized_percentile":{"value":0.95658747,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"93","last_page":"104"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8592321872711182},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7761040329933167},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7033627033233643},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.6595621109008789},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5654102563858032},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5450636744499207},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.4720340967178345},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4603639841079712},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.45102614164352417},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.34535685181617737},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21493640542030334},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.19059908390045166},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.16149476170539856},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12360551953315735},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08594495058059692},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.08447951078414917}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8592321872711182},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7761040329933167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7033627033233643},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.6595621109008789},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5654102563858032},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5450636744499207},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.4720340967178345},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4603639841079712},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.45102614164352417},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.34535685181617737},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21493640542030334},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.19059908390045166},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.16149476170539856},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12360551953315735},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08594495058059692},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.08447951078414917},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2995272.2995279","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2995272.2995279","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2995272.2995279?download=true","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/2995272.2995279","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2995272.2995279","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2995272.2995279?download=true","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2747436919","display_name":null,"funder_award_id":"W911NF-13-1-","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G3860056106","display_name":null,"funder_award_id":"W911NF-13-1-042","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G6274897657","display_name":null,"funder_award_id":"W911NF-13","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G6471190695","display_name":null,"funder_award_id":"W911NF-13-1-0421","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7452299184","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G8998121839","display_name":null,"funder_award_id":"911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2535017274.pdf","grobid_xml":"https://content.openalex.org/works/W2535017274.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W102212266","https://openalex.org/W122990498","https://openalex.org/W151026171","https://openalex.org/W1595736499","https://openalex.org/W1757771748","https://openalex.org/W1965505845","https://openalex.org/W2016668099","https://openalex.org/W2022537828","https://openalex.org/W2041198666","https://openalex.org/W2050315535","https://openalex.org/W2051650380","https://openalex.org/W2057826593","https://openalex.org/W2084896955","https://openalex.org/W2086454935","https://openalex.org/W2104692292","https://openalex.org/W2105125588","https://openalex.org/W2114817810","https://openalex.org/W2118024052","https://openalex.org/W2139153904","https://openalex.org/W2162969618","https://openalex.org/W2247546441","https://openalex.org/W2491796552","https://openalex.org/W2534401549","https://openalex.org/W2589919438","https://openalex.org/W2963665351","https://openalex.org/W4243917453","https://openalex.org/W4285719527","https://openalex.org/W6677619944"],"related_works":["https://openalex.org/W2765763546","https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4390188535","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W2157496457"],"abstract_inverted_index":{"Distributed":[0],"denial-of-service":[1,76],"attacks":[2,113],"are":[3],"an":[4,66],"increasing":[5,32],"problem":[6],"facing":[7],"web":[8],"applications,":[9],"for":[10,34,120,143],"which":[11],"many":[12],"defense":[13],"techniques":[14],"have":[15],"been":[16],"proposed,":[17],"including":[18],"several":[19],"moving-target":[20,63],"strategies.":[21],"These":[22],"strategies":[23,105],"typically":[24],"work":[25,49],"by":[26],"relocating":[27],"targeted":[28],"services":[29],"over":[30],"time,":[31],"uncertainty":[33],"the":[35,88,91,102,121],"attacker,":[36,68],"while":[37],"trying":[38],"not":[39,51],"to":[40,148],"disrupt":[41],"legitimate":[42],"users":[43],"or":[44],"incur":[45],"excessive":[46],"costs.":[47],"Prior":[48],"has":[50],"shown,":[52],"however,":[53],"whether":[54],"and":[55,69,82,114,136],"how":[56],"a":[57,62,75,79,84,110],"rational":[58],"defender":[59],"would":[60],"choose":[61],"method":[64],"against":[65],"adaptive":[67],"under":[70,109],"what":[71],"conditions.":[72,116],"We":[73,117],"formulate":[74],"scenario":[77],"as":[78,129],"two-player":[80],"game,":[81],"solve":[83],"restricted-strategy":[85],"version":[86],"of":[87,93,104,112,124],"game":[89],"using":[90],"methods":[92],"empirical":[94],"game-theoretic":[95],"analysis.":[96],"Using":[97],"agent-based":[98],"simulation,":[99],"we":[100],"evaluate":[101],"performance":[103],"from":[106],"prior":[107],"literature":[108],"variety":[111],"environmental":[115],"find":[118],"evidence":[119],"strategic":[122],"stability":[123],"various":[125],"proposed":[126],"strategies,":[127],"such":[128],"proactive":[130],"server":[131],"movement,":[132],"delayed":[133],"attack":[134],"timing,":[135],"suspected":[137],"insider":[138],"blocking,":[139],"along":[140],"with":[141],"guidelines":[142],"when":[144],"each":[145],"is":[146],"likely":[147],"be":[149],"most":[150],"effective.":[151]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":4}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
