{"id":"https://openalex.org/W2606631997","doi":"https://doi.org/10.1155/2017/3659167","title":"CHAOS: An SDN-Based Moving Target Defense System","display_name":"CHAOS: An SDN-Based Moving Target Defense System","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2606631997","doi":"https://doi.org/10.1155/2017/3659167","mag":"2606631997"},"language":"en","primary_location":{"id":"doi:10.1155/2017/3659167","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/3659167","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/3659167.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/scn/2017/3659167.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100629589","display_name":"Yuan Shi","orcid":"https://orcid.org/0000-0002-6150-7513"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Shi","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0002-6150-7513","affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026793623","display_name":"Huanguo Zhang","orcid":"https://orcid.org/0000-0001-5801-2897"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huanguo Zhang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100347410","display_name":"Juan Wang","orcid":"https://orcid.org/0000-0001-8813-7842"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Juan Wang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0001-8813-7842","affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000194562","display_name":"Feng Xiao","orcid":"https://orcid.org/0000-0001-8199-6249"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Xiao","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062346297","display_name":"Jianwei Huang","orcid":"https://orcid.org/0000-0001-6631-1096"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianwei Huang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058071176","display_name":"Daochen Zha","orcid":"https://orcid.org/0000-0002-6677-7504"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Daochen Zha","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056657952","display_name":"Hongxin Hu","orcid":"https://orcid.org/0000-0001-8710-247X"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hongxin Hu","raw_affiliation_strings":["Division of Computer Science, School of Computing, Clemson University, Clemson, SC 29634, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Division of Computer Science, School of Computing, Clemson University, Clemson, SC 29634, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101649813","display_name":"Fei Yan","orcid":"https://orcid.org/0000-0003-0492-3278"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Yan","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071895912","display_name":"Bo Zhao","orcid":"https://orcid.org/0000-0003-4307-9380"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Zhao","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School of Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5100347410"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.5351,"has_fulltext":true,"cited_by_count":32,"citation_normalized_percentile":{"value":0.84908131,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"2017","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8530606031417847},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8325707316398621},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.6625171899795532},{"id":"https://openalex.org/keywords/chaos","display_name":"CHAOS (operating system)","score":0.6058739423751831},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45954981446266174},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.43171218037605286},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.42952680587768555},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.41821420192718506},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41613009572029114},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4085654616355896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8530606031417847},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8325707316398621},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.6625171899795532},{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.6058739423751831},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45954981446266174},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.43171218037605286},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.42952680587768555},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.41821420192718506},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41613009572029114},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4085654616355896},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2017/3659167","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/3659167","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/3659167.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a47bf109c4544d2c97ab7dd06a8a3a84","is_oa":true,"landing_page_url":"https://doaj.org/article/a47bf109c4544d2c97ab7dd06a8a3a84","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2017 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2017/3659167","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/3659167","pdf_url":"http://downloads.hindawi.com/journals/scn/2017/3659167.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1080838668","display_name":null,"funder_award_id":"61332019","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1177760818","display_name":null,"funder_award_id":"2014CB340601","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G3295101027","display_name":null,"funder_award_id":"2015AA016002","funder_id":"https://openalex.org/F4320335773","funder_display_name":"National High-tech Research and Development Program"},{"id":"https://openalex.org/G4423385843","display_name":null,"funder_award_id":"61272452","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5618858992","display_name":null,"funder_award_id":"2015AA016002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5671625658","display_name":null,"funder_award_id":"61272452","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5784638117","display_name":null,"funder_award_id":"61402342","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6585665257","display_name":null,"funder_award_id":"2014CB340601","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6834705006","display_name":null,"funder_award_id":"2015AA016002","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G703678893","display_name":null,"funder_award_id":"61402342","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7064484859","display_name":null,"funder_award_id":"61332019","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335773","display_name":"National High-tech Research and Development Program","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2606631997.pdf","grobid_xml":"https://content.openalex.org/works/W2606631997.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W104805067","https://openalex.org/W105015318","https://openalex.org/W107867273","https://openalex.org/W136163439","https://openalex.org/W2106306039","https://openalex.org/W2115691067","https://openalex.org/W2147118406","https://openalex.org/W2159670077","https://openalex.org/W2565828169"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W2132360941","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2951345506","https://openalex.org/W4385688894","https://openalex.org/W4406331720","https://openalex.org/W3155797402","https://openalex.org/W2809425066"],"abstract_inverted_index":{"Moving":[0],"target":[1,168],"defense":[2,11,35,52,169],"(MTD)":[3],"has":[4],"provided":[5],"a":[6,44,137,177],"dynamic":[7,31,49],"and":[8,32,37,50,67,82,122,126,150],"proactive":[9,51],"network":[10,26,178],"to":[12,29,111,135,165,192],"reduce":[13],"or":[14],"move":[15],"the":[16,65,73,90,93,98,106,113,117,143,186,194],"attack":[17,74],"surface":[18,75],"that":[19,176],"is":[20,27,182],"available":[21],"for":[22,47,142],"exploitation.":[23],"However,":[24],"traditional":[25],"difficult":[28],"realize":[30,166],"active":[33],"security":[34],"effectively":[36,191],"comprehensively.":[38],"Software-defined":[39],"networking":[40,94],"(SDN)":[41],"points":[42],"out":[43],"brand-new":[45],"path":[46],"building":[48],"system.":[53,63],"In":[54],"this":[55],"paper,":[56],"we":[57,130],"propose":[58,97],"CHAOS,":[59],"an":[60,120,154],"SDN-based":[61],"MTD":[62],"Utilizing":[64],"programmability":[66],"flexibility":[68],"of":[69,92,115,140,156,184,188,197],"SDN,":[70],"CHAOS":[71,152,181],"obfuscates":[72],"including":[76],"host":[77],"mutation":[78],"obfuscation,":[79,81],"ports":[80],"obfuscation":[83,141],"based":[84],"on":[85],"decoy":[86],"servers,":[87],"thereby":[88],"enhancing":[89],"unpredictability":[91],"environment.":[95],"We":[96,148],"Chaos":[99,107],"Tower":[100,108],"Obfuscation":[101],"(CTO)":[102],"method,":[103],"which":[104],"uses":[105],"Structure":[109],"(CTS)":[110],"depict":[112],"hierarchy":[114],"all":[116],"hosts":[118,144],"in":[119,145,170],"intranet":[121],"define":[123],"expected":[124],"connection":[125],"unexpected":[127],"connection.":[128],"Moreover,":[129],"develop":[131],"fast":[132],"CTO":[133],"algorithms":[134],"achieve":[136],"different":[138],"degree":[139],"each":[146],"layer.":[147],"design":[149],"implement":[151],"as":[153],"application":[155],"SDN":[157],"controller.":[158],"Our":[159,172],"approach":[160],"makes":[161],"it":[162],"very":[163],"easy":[164],"moving":[167],"networks.":[171],"experimental":[173],"results":[174],"show":[175],"protected":[179],"by":[180],"capable":[183],"decreasing":[185],"percentage":[187],"information":[189],"disclosure":[190],"guarantee":[193],"normal":[195],"flow":[196],"traffic.":[198]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
