{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T01:13:26Z","timestamp":1728177206225},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11432-021-3462-4","type":"journal-article","created":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T07:03:04Z","timestamp":1656658984000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning"],"prefix":"10.1007","volume":"65","author":[{"given":"Huanruo","family":"Li","sequence":"first","affiliation":[]},{"given":"Yunfei","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Shumin","family":"Huo","sequence":"additional","affiliation":[]},{"given":"Hongchao","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Penghao","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,23]]},"reference":[{"key":"3462_CR1","first-page":"80","volume":"1","author":"E M Hutchins","year":"2011","unstructured":"Hutchins E M, Cloppert M J, Amin R M, et al. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues Inform Warfare Secur Res, 2011, 1: 80","journal-title":"Leading Issues Inform Warfare Secur Res"},{"key":"3462_CR2","doi-asserted-by":"publisher","first-page":"101905","DOI":"10.1016\/j.cose.2020.101905","volume":"97","author":"M Compasti\u00e9","year":"2020","unstructured":"Compasti\u00e9 M, Badonnel R, Festor O, et al. From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models. Comput Secur, 2020, 97: 101905","journal-title":"Comput Secur"},{"key":"3462_CR3","doi-asserted-by":"crossref","unstructured":"Garcia M, Bessani A, Gashi I, et al. OS diversity for intrusion tolerance: myth or reality? In: Proceedings of 2011 IEEE\/IFIP 41st International Conference on Dependable Systems and Networks (DSN), 2011. 383\u2013394","DOI":"10.1109\/DSN.2011.5958251"},{"key":"3462_CR4","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/TNSM.2017.2724239","volume":"14","author":"S Achleitner","year":"2017","unstructured":"Achleitner S, La Porta T F, McDaniel P, et al. Deceiving network reconnaissance using SDN-based virtual topologies. IEEE Trans Netw Serv Manage, 2017, 14: 1098\u20131112","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"3462_CR5","first-page":"111","volume-title":"The Best Damn Firewall Book Period","author":"A Carasik-Henmi","year":"2003","unstructured":"Carasik-Henmi A, Shinder T W, Amon C, et al. Chapter 4\u2014Introduction to intrusion detection systems. In: The Best Damn Firewall Book Period. Burlington: Syngress, 2003. 111\u2013124"},{"key":"3462_CR6","doi-asserted-by":"crossref","unstructured":"Virvilis N, Vanautgaerden B, Serrano O S. Changing the game: the art of deceiving sophisticated attackers. In: Proceedings of the 6th International Conference On Cyber Conflict (CyCon 2014), 2014. 87\u201397","DOI":"10.1109\/CYCON.2014.6916397"},{"key":"3462_CR7","unstructured":"Fraunholz D, Anton S D, Lipps C, et al. Demystifying deception technology: a survey. 2018. ArXiv:1804.06196"},{"key":"3462_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3214305","volume":"51","author":"X Han","year":"2018","unstructured":"Han X, Kheir N, Balzarotti D. Deception techniques in computer security. ACM Comput Surv, 2018, 51: 1\u201336","journal-title":"ACM Comput Surv"},{"key":"3462_CR9","unstructured":"Lu Z, Wang C, Zhao S, et al. Cyber deception for computer and network security: survey and challenges. 2020. ArXiv:2007.14497"},{"key":"3462_CR10","doi-asserted-by":"crossref","unstructured":"Durkota K, Lisy V, Bosansky B, et al. Optimal network security hardening using attack graph games. In: Proceedings of the 24th International Conference on Artificial Intelligence, 2015. 526\u2013532","DOI":"10.1109\/MIS.2016.74"},{"key":"3462_CR11","doi-asserted-by":"crossref","unstructured":"Fraunholz D, Schotten H D. Defending web servers with feints, distraction and obfuscation. In: Proceedings of 2018 International Conference on Computing, Networking and Communications (ICNC), 2018. 21\u201325","DOI":"10.1109\/ICCNC.2018.8390365"},{"key":"3462_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3337772","volume":"52","author":"J Pawlick","year":"2019","unstructured":"Pawlick J, Colbert E, Zhu Q. A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Comput Surv, 2019, 52: 1\u201328","journal-title":"ACM Comput Surv"},{"key":"3462_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/0890-5401(92)90048-K","volume":"96","author":"A Condon","year":"1992","unstructured":"Condon A. The complexity of stochastic games. Inf Comput, 1992, 96: 203\u2013224","journal-title":"Inf Comput"},{"key":"3462_CR14","first-page":"27","volume":"29","author":"K Kaynar","year":"2016","unstructured":"Kaynar K. A taxonomy for attack graph generation and usage in network security. J Inf Secur Appl, 2016, 29: 27\u201356","journal-title":"J Inf Secur Appl"},{"key":"3462_CR15","doi-asserted-by":"crossref","unstructured":"Duan Q, Al-Shaer E, Islam M, et al. CONCEAL: a strategy composition for resilient cyber deception-framework, metrics and deployment. In: Proceedings of IEEE Conference on Communications and Network Security (CNS), 2018. 1\u20139","DOI":"10.1109\/CNS.2018.8433196"},{"key":"3462_CR16","doi-asserted-by":"publisher","first-page":"220303","DOI":"10.1007\/s11432-019-2834-x","volume":"63","author":"Y Y Qu","year":"2020","unstructured":"Qu Y Y, Zhang J W, Li R D, et al. Generative adversarial networks enhanced location privacy in 5G networks. Sci China Inf Sci, 2020, 63: 220303","journal-title":"Sci China Inf Sci"},{"key":"3462_CR17","doi-asserted-by":"publisher","first-page":"162303","DOI":"10.1007\/s11432-020-3125-y","volume":"64","author":"Z L Ning","year":"2021","unstructured":"Ning Z L, Sun S M, Wang X J, et al. Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach. Sci China Inf Sci, 2021, 64: 162303","journal-title":"Sci China Inf Sci"},{"key":"3462_CR18","unstructured":"Roy S, Sharmin N, Acosta J C, et al. Survey and taxonomy of adversarial reconnaissance techniques. 2021. ArXiv:2105.04749"},{"key":"3462_CR19","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.future.2019.11.003","volume":"111","author":"Y Wang","year":"2020","unstructured":"Wang Y, Guo Y, Guo Z, et al. CLOSURE: a cloud scientific workflow scheduling algorithm based on attack-defense game model. Future Generation Comput Syst, 2020, 111: 460\u2013474","journal-title":"Future Generation Comput Syst"},{"key":"3462_CR20","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s11235-019-00616-1","volume":"73","author":"E M Kandoussi","year":"2020","unstructured":"Kandoussi E M, Hanini M, El Mir I, et al. Toward an integrated dynamic defense system for strategic detecting attacks in cloud networks using stochastic game. Telecommun Syst, 2020, 73: 397\u2013417","journal-title":"Telecommun Syst"},{"key":"3462_CR21","doi-asserted-by":"publisher","first-page":"3473","DOI":"10.1007\/s12652-019-01471-3","volume":"11","author":"J Zhan","year":"2020","unstructured":"Zhan J, Fan X, Han J, et al. CIADL: cloud insider attack detector and locator on multi-tenant network isolation: an OpenStack case study. J Ambient Intell Hum Comput, 2020, 11: 3473\u20133495","journal-title":"J Ambient Intell Hum Comput"},{"key":"3462_CR22","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/S0167-4048(98)80071-0","volume":"17","author":"F Cohen","year":"1998","unstructured":"Cohen F. A note on the role of deception in information protection. Comput Secur, 1998, 17: 483\u2013506","journal-title":"Comput Secur"},{"key":"3462_CR23","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MSECP.2003.1193207","volume":"1","author":"L Spitzner","year":"2003","unstructured":"Spitzner L. The Honeynet Project: trapping the hackers. IEEE Secur Privacy, 2003, 1: 15\u201323","journal-title":"IEEE Secur Privacy"},{"key":"3462_CR24","doi-asserted-by":"crossref","unstructured":"Petrunic A R. Honeytokens as active defense. In: Proceedings of the 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2015. 1313\u20131317","DOI":"10.1109\/MIPRO.2015.7160478"},{"key":"3462_CR25","first-page":"942","volume-title":"From patches to honey-patches","author":"F Araujo","year":"2014","unstructured":"Araujo F, Hamlen K W, Biedermann S, et al. From patches to honey-patches. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2014. 942\u2013953"},{"key":"3462_CR26","first-page":"69","volume-title":"Ensuring deception consistency for FTP services hardened against advanced persistent threats","author":"Z Shu","year":"2018","unstructured":"Shu Z, Yan G. Ensuring deception consistency for FTP services hardened against advanced persistent threats. In: Proceedings of the 5th ACM Workshop on Moving Target Defense. New York: ACM, 2018. 69\u201379"},{"key":"3462_CR27","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.cose.2016.05.002","volume":"61","author":"J L Rrushi","year":"2016","unstructured":"Rrushi J L. NIC displays to thwart malware attacks mounted from within the OS. Comput Secur, 2016, 61: 59\u201371","journal-title":"Comput Secur"},{"key":"3462_CR28","doi-asserted-by":"crossref","unstructured":"Kyriakou A, Sklavos N. Container-based honeypot deployment for the analysis of malicious activity. In: Proceedings of Global Information Infrastructure and Networking Symposium, 2019","DOI":"10.1109\/GIIS.2018.8635778"},{"key":"3462_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41187-3","volume-title":"Introduction to Cyberdeception","author":"N C Rowe","year":"2016","unstructured":"Rowe N C, Rrushi J. Introduction to Cyberdeception. Cham: Springer, 2016"},{"key":"3462_CR30","doi-asserted-by":"crossref","unstructured":"Zhu Q. Game theory for cyber deception: a tutorial. In: Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019","DOI":"10.1145\/3314058.3314067"},{"key":"3462_CR31","doi-asserted-by":"publisher","first-page":"1361","DOI":"10.1109\/TIFS.2017.2779436","volume":"13","author":"H M J Almohri","year":"2018","unstructured":"Almohri H M J, Watson L T, Evans D. Misery digraphs: delaying intrusion attacks in obscure clouds. IEEE Trans Inform Forensic Secur, 2018, 13: 1361\u20131375","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"3462_CR32","doi-asserted-by":"publisher","first-page":"101579","DOI":"10.1016\/j.cose.2019.101579","volume":"87","author":"K Hor\u00e1k","year":"2019","unstructured":"Hor\u00e1k K, Bo\u0161ansk\u00fd B, Tom\u00e1\u0161ek P, et al. Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games. Comput Secur, 2019, 87: 101579","journal-title":"Comput Secur"},{"key":"3462_CR33","first-page":"21","volume-title":"Probabilistic performance analysis of moving target and deception reconnaissance defenses","author":"M Crouse","year":"2015","unstructured":"Crouse M, Prosser B, Fulp E W. Probabilistic performance analysis of moving target and deception reconnaissance defenses. In: Proceedings of the 2nd ACM Workshop on Moving Target Defense. New York: ACM, 2015. 21\u201329"},{"key":"3462_CR34","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih V, Kavukcuoglu K, Silver D, et al. Human-level control through deep reinforcement learning. Nature, 2015, 518: 529\u2013533","journal-title":"Nature"},{"key":"3462_CR35","doi-asserted-by":"crossref","unstructured":"Sethi K, Kumar R, Prajapati N, et al. Deep reinforcement learning based intrusion detection system for cloud infrastructure. In: Proceedings of International Conference on Communication Systems & NETworkS (COMSNETS), 2020. 1\u20136","DOI":"10.1109\/COMSNETS48256.2020.9027452"},{"key":"3462_CR36","unstructured":"Provos N. Honeyd\u2014a virtual honeypot daemon. In: Proceedings of the 10th DFN-CERT Workshop, Hamburg, 2003. 4"},{"key":"3462_CR37","doi-asserted-by":"crossref","unstructured":"Cabral W, Valli C, Sikos L, et al. Review and analysis of cowrie artefacts and their potential to be used deceptively. In: Proceedings of International Conference on Computational Science and Computational Intelligence (CSCI), 2019. 166\u2013171","DOI":"10.1109\/CSCI49370.2019.00035"},{"key":"3462_CR38","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1109\/TIFS.2016.2516916","volume":"11","author":"M Zhang","year":"2016","unstructured":"Zhang M, Wang L, Jajodia S, et al. Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks. IEEE Trans Inform Forensic Secur, 2016, 11: 1071\u20131086","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"3462_CR39","first-page":"41","volume-title":"Diverse virtual replicas for improving intrusion tolerance in cloud","author":"M Guo","year":"2014","unstructured":"Guo M, Bhattacharya P. Diverse virtual replicas for improving intrusion tolerance in cloud. In: Proceedings of the 9th Annual Cyber and Information Security Research Conference. New York: ACM Press, 2014. 41\u201344"},{"key":"3462_CR40","unstructured":"Schulman J, Wolski F, Dhariwal P, et al. Proximal policy optimization algorithms. 2017. ArXiv:1707.06347"},{"key":"3462_CR41","series-title":"Adaptive Autonomous Secure Cyber Systems","first-page":"231","volume-title":"Online learning methods for controlling dynamic cyber deception strategies","author":"M Gutierrez","year":"2020","unstructured":"Gutierrez M, Kiekintveld C. Online learning methods for controlling dynamic cyber deception strategies. In: Adaptive Autonomous Secure Cyber Systems. Cham: Springer, 2020. 231\u2013251"},{"key":"3462_CR42","unstructured":"Schlenker A, Thakoor O, Xu H, et al. Deceiving cyber adversaries: a game theoretic approach. In: Proceedings of International Conference on Autonomous Agents and Multiagent Systems, 2018"},{"key":"3462_CR43","doi-asserted-by":"crossref","unstructured":"Sengupta S, Chowdhary A, Huang D, et al. Moving target defense for the placement of intrusion detection systems in the cloud. In: Proceedings of International Conference on Decision and Game Theory for Security, 2018. 326\u2013345","DOI":"10.1007\/978-3-030-01554-1_19"},{"key":"3462_CR44","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1461928.1461951","volume":"52","author":"C Daskalakis","year":"2009","unstructured":"Daskalakis C, Goldberg P W, Papadimitriou C H. The complexity of computing a Nash equilibrium. Commun ACM, 2009, 52: 89\u201397","journal-title":"Commun ACM"},{"key":"3462_CR45","doi-asserted-by":"crossref","unstructured":"Lipton R J, Markakis E, Mehta A. Playing large games using simple strategies. In: Proceedings of the 4th ACM Conference on Electronic Commerce, 2003. 36\u201341","DOI":"10.1145\/779928.779933"},{"key":"3462_CR46","first-page":"1","volume":"48","author":"J Y Chen","year":"2022","unstructured":"Chen J Y, Zhang Y, Wang X, et al. A survey of attack, defense and related security analysis for deep reinforcement learning. Acta Autom Sin, 2022, 48: 1\u201319","journal-title":"Acta Autom Sin"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-021-3462-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-021-3462-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-021-3462-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T21:05:15Z","timestamp":1691183115000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-021-3462-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,23]]},"references-count":46,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["3462"],"URL":"https:\/\/doi.org\/10.1007\/s11432-021-3462-4","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,23]]},"assertion":[{"value":"31 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"170305"}}