{"id":"https://openalex.org/W2923077998","doi":"https://doi.org/10.1145/3338468.3356824","title":"A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense","display_name":"A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense","publication_year":2019,"publication_date":"2019-11-08","ids":{"openalex":"https://openalex.org/W2923077998","doi":"https://doi.org/10.1145/3338468.3356824","mag":"2923077998"},"language":"en","primary_location":{"id":"doi:10.1145/3338468.3356824","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338468.3356824","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1903.10102","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yuyang Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuyang Zhou","raw_affiliation_strings":["Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Guang Cheng","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Shanqing Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shanqing Jiang","raw_affiliation_strings":["Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ying Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Hu","raw_affiliation_strings":["Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yuyu Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuyu Zhao","raw_affiliation_strings":["Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":null,"display_name":"Zihan Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zihan Chen","raw_affiliation_strings":["Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":2.2242,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.88794049,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"57","last_page":"66"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.9901999831199646},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7591000199317932},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5486999750137329},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.42820000648498535},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.38359999656677246},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.37119999527931213}],"concepts":[{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.9901999831199646},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7591000199317932},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6844000220298767},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5486999750137329},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.42820000648498535},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.38359999656677246},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3797000050544739},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.37119999527931213},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.33959999680519104},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.3264999985694885},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.29030001163482666}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3338468.3356824","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338468.3356824","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1903.10102","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1903.10102","pdf_url":"https://arxiv.org/pdf/1903.10102","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1903.10102","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1903.10102","pdf_url":"https://arxiv.org/pdf/1903.10102","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W107867273","https://openalex.org/W1587546357","https://openalex.org/W1995716850","https://openalex.org/W1997857984","https://openalex.org/W2016668099","https://openalex.org/W2018198031","https://openalex.org/W2028950523","https://openalex.org/W2066909550","https://openalex.org/W2086802441","https://openalex.org/W2090650780","https://openalex.org/W2276629685","https://openalex.org/W2293796414","https://openalex.org/W2400254479","https://openalex.org/W2528464937","https://openalex.org/W2534612228","https://openalex.org/W2553733554","https://openalex.org/W2606733399","https://openalex.org/W2741862600","https://openalex.org/W2762039412","https://openalex.org/W2765449849","https://openalex.org/W2775516695","https://openalex.org/W2778075167","https://openalex.org/W2790159620","https://openalex.org/W2888219913","https://openalex.org/W2889979954","https://openalex.org/W2901450325","https://openalex.org/W2907753699","https://openalex.org/W2908942324","https://openalex.org/W2946511964","https://openalex.org/W6752979903"],"related_works":[],"abstract_inverted_index":{"Moving":[0],"Target":[1],"Defense":[2],"(MTD)":[3],"has":[4,20],"emerged":[5],"as":[6,23],"a":[7,50,75,103,120],"newcomer":[8],"into":[9],"the":[10,26,46,55,64,93,96,99,109,113],"asymmetric":[11],"field":[12],"of":[13,25,59,117],"attack":[14],"and":[15,17,57,62,98,101,115,126,144],"defense,":[16],"shuffling-based":[18],"MTD":[19,48],"been":[21],"regarded":[22],"one":[24],"most":[27],"effective":[28,146],"ways":[29],"to":[30,53,91],"mitigate":[31],"DDoS":[32,81,149],"attacks.":[33,150],"However,":[34],"previous":[35],"work":[36],"does":[37],"not":[38],"acknowledge":[39],"that":[40,136],"frequent":[41],"shuffles":[42],"would":[43],"significantly":[44],"intensify":[45],"overhead.":[47],"requires":[49],"quantitative":[51],"measure":[52],"compare":[54],"cost":[56,116],"effectiveness":[58,114],"available":[60],"adaptations":[61],"explore":[63],"best":[65,110],"trade-off":[66,111],"between":[67,95,112],"them.":[68],"In":[69],"this":[70],"paper,":[71],"therefore,":[72],"we":[73,107],"propose":[74],"new":[76],"cost-effective":[77,104],"shuffling":[78,105,118,122,142],"method":[79],"against":[80],"attacks":[82],"using":[83],"MTD.":[84],"By":[85],"exploiting":[86],"Multi-Objective":[87],"Markov":[88],"Decision":[89],"Processes":[90],"model":[92],"interaction":[94],"attacker":[97],"defender,":[100],"designing":[102],"algorithm,":[106],"study":[108],"in":[119,147],"given":[121],"scenario.":[123],"Finally,":[124],"simulation":[125],"experimentation":[127],"on":[128],"an":[129,140],"experimental":[130],"software":[131],"defined":[132],"network":[133],"(SDN)":[134],"indicate":[135],"our":[137],"approach":[138],"imposes":[139],"acceptable":[141],"overload":[143],"is":[145],"mitigating":[148]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2019-04-01T00:00:00"}
