{"id":"https://openalex.org/W4308222380","doi":"https://doi.org/10.1145/3560828.3564006","title":"Evaluating Deception and Moving Target Defense with Network Attack Simulation","display_name":"Evaluating Deception and Moving Target Defense with Network Attack Simulation","publication_year":2022,"publication_date":"2022-11-04","ids":{"openalex":"https://openalex.org/W4308222380","doi":"https://doi.org/10.1145/3560828.3564006"},"language":"en","primary_location":{"id":"doi:10.1145/3560828.3564006","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3560828.3564006","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2301.10629","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053869071","display_name":"Daniel Reti","orcid":"https://orcid.org/0000-0001-8071-6188"},"institutions":[{"id":"https://openalex.org/I33256026","display_name":"German Research Centre for Artificial Intelligence","ror":"https://ror.org/01ayc5b57","country_code":"DE","type":"funder","lineage":["https://openalex.org/I33256026"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Daniel Reti","raw_affiliation_strings":["German Research Center For Artificial Intelligence, Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"German Research Center For Artificial Intelligence, Kaiserslautern, Germany","institution_ids":["https://openalex.org/I33256026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078305527","display_name":"Daniel Fraunholz","orcid":"https://orcid.org/0000-0002-9201-261X"},"institutions":[{"id":"https://openalex.org/I33256026","display_name":"German Research Centre for Artificial Intelligence","ror":"https://ror.org/01ayc5b57","country_code":"DE","type":"funder","lineage":["https://openalex.org/I33256026"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Daniel Fraunholz","raw_affiliation_strings":["German Research Center For Artificial Intelligence, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"German Research Center For Artificial Intelligence, Munich, Germany","institution_ids":["https://openalex.org/I33256026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025410715","display_name":"Karina Elzer","orcid":"https://orcid.org/0000-0002-3984-779X"},"institutions":[{"id":"https://openalex.org/I33256026","display_name":"German Research Centre for Artificial Intelligence","ror":"https://ror.org/01ayc5b57","country_code":"DE","type":"funder","lineage":["https://openalex.org/I33256026"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Karina Elzer","raw_affiliation_strings":["German Research Center For Artificial Intelligence, Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"German Research Center For Artificial Intelligence, Kaiserslautern, Germany","institution_ids":["https://openalex.org/I33256026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012753154","display_name":"Daniel Schneider","orcid":"https://orcid.org/0000-0002-1736-2417"},"institutions":[{"id":"https://openalex.org/I33256026","display_name":"German Research Centre for Artificial Intelligence","ror":"https://ror.org/01ayc5b57","country_code":"DE","type":"funder","lineage":["https://openalex.org/I33256026"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Daniel Schneider","raw_affiliation_strings":["German Research Center For Artificial Intelligence, Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"German Research Center For Artificial Intelligence, Kaiserslautern, Germany","institution_ids":["https://openalex.org/I33256026"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008473850","display_name":"Hans D. Schotten","orcid":"https://orcid.org/0000-0001-5005-3635"},"institutions":[{"id":"https://openalex.org/I33256026","display_name":"German Research Centre for Artificial Intelligence","ror":"https://ror.org/01ayc5b57","country_code":"DE","type":"funder","lineage":["https://openalex.org/I33256026"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Hans Dieter Schotten","raw_affiliation_strings":["German Research Center For Artificial Intelligence, Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"German Research Center For Artificial Intelligence, Kaiserslautern, Germany","institution_ids":["https://openalex.org/I33256026"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5053869071"],"corresponding_institution_ids":["https://openalex.org/I33256026"],"apc_list":null,"apc_paid":null,"fwci":1.5697,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.84045805,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"45","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9764297604560852},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.859503448009491},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7413504719734192},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7032426595687866},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5543251037597656},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5315256714820862}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9764297604560852},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.859503448009491},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7413504719734192},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7032426595687866},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5543251037597656},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5315256714820862},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3560828.3564006","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3560828.3564006","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2301.10629","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2301.10629","pdf_url":"https://arxiv.org/pdf/2301.10629","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2301.10629","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2301.10629","pdf_url":"https://arxiv.org/pdf/2301.10629","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G352791218","display_name":null,"funder_award_id":"(BMBF)","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G4070284777","display_name":null,"funder_award_id":"Open6GHub","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G4323006697","display_name":null,"funder_award_id":"16KISK003K","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"}],"funders":[{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4308222380.pdf"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W145844368","https://openalex.org/W1665985821","https://openalex.org/W1986495842","https://openalex.org/W2000559366","https://openalex.org/W2012910199","https://openalex.org/W2026711169","https://openalex.org/W2090650780","https://openalex.org/W2093397575","https://openalex.org/W2106306039","https://openalex.org/W2118795709","https://openalex.org/W2130778370","https://openalex.org/W2159601538","https://openalex.org/W2280722976","https://openalex.org/W2492680524","https://openalex.org/W2766667285","https://openalex.org/W2797887368","https://openalex.org/W2806482912","https://openalex.org/W2884750245","https://openalex.org/W2897529494","https://openalex.org/W2961892647","https://openalex.org/W2980400451","https://openalex.org/W3007573367","https://openalex.org/W3013219028","https://openalex.org/W3159238935","https://openalex.org/W4288400169","https://openalex.org/W4299458083","https://openalex.org/W4394666657"],"related_works":["https://openalex.org/W2350724208","https://openalex.org/W2000018903","https://openalex.org/W3142690625","https://openalex.org/W1534090575","https://openalex.org/W2360866534","https://openalex.org/W2372392697","https://openalex.org/W4312961703","https://openalex.org/W2362932354","https://openalex.org/W2391396896","https://openalex.org/W2998623387"],"abstract_inverted_index":{"In":[0,77],"the":[1,7,29,39,60,69,72,84,103,158,161,170,195],"field":[2],"of":[3,32,42,62,74,86,164],"network":[4,94,123,136,172,200],"security,":[5],"with":[6,150,192],"ongoing":[8],"arms":[9],"race":[10],"between":[11],"attackers,":[12],"seeking":[13],"new":[14],"vulnerabilities":[15],"to":[16,82,100,110,117,126,129,166,186,194],"bypass":[17],"defense":[18,91],"mechanisms":[19],"and":[20,26,54,67,88,119,137,147,154,169,189,198],"defenders":[21],"reinforcing":[22],"their":[23],"prevention,":[24],"detection":[25],"response":[27],"strategies,":[28],"novel":[30],"concept":[31],"cyber":[33],"deception":[34,46],"has":[35],"emerged.":[36],"Starting":[37],"from":[38],"well-known":[40],"example":[41],"honeypots,":[43],"many":[44,115],"other":[45],"strategies":[47],"have":[48,125],"been":[49],"developed":[50],"such":[51],"as":[52],"honeytokens":[53],"moving":[55,89],"target":[56,90],"defense,":[57],"all":[58],"sharing":[59],"objective":[61],"creating":[63],"uncertainty":[64],"for":[65,71],"attackers":[66],"increasing":[68],"chance":[70],"attacker":[73,138,196],"making":[75],"mistakes.":[76],"this":[78,141,180],"paper":[79],"a":[80,93,106,151],"methodology":[81,98],"evaluate":[83],"effectiveness":[85,104],"honeypots":[87,116,165],"in":[92,105,134],"is":[95],"presented.":[96],"This":[97],"allows":[99],"quantitatively":[101],"measure":[102],"simulation":[107],"environment,":[108],"allowing":[109],"make":[111],"recommendations":[112],"on":[113,120,184],"how":[114,121,185],"deploy":[118,188],"quickly":[122],"addresses":[124],"be":[127,145,167,177],"mutated":[128],"effectively":[130],"disrupt":[131],"an":[132],"attack":[133],"multiple":[135],"configurations.":[139],"With":[140,157],"optimum,":[142],"attacks":[143],"can":[144,176],"detected":[146],"slowed":[148],"down":[149],"minimal":[152],"resource":[153],"configuration":[155],"overhead.":[156],"provided":[159],"methodology,":[160],"optimal":[162,171],"number":[163],"deployed":[168],"address":[173],"mutation":[174],"interval":[175],"determined.":[178],"Furthermore,":[179],"work":[181],"provides":[182],"guidance":[183],"optimally":[187],"configure":[190],"them":[191],"respect":[193],"model":[197],"several":[199],"parameters.":[201]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
