C. Pautasso, O. Zimmermann, M. Amundsen, J. Lewis, and N. Josuttis, Microservices in Practice, Part 1: Reality Check and Service Design, IEEE Software, vol.34, issue.1, pp.91-98, 2017.
DOI : 10.1109/MS.2017.24

S. Newman, Building Microservices, 2015.

A. Tanenbaum and M. Van-steen, Distributed Systems: Principles and Paradigms, 2007.

O. Zimmermann, Microservices tenets, Computer Science - Research and Development, vol.32, issue.5, pp.1-10, 2016.
DOI : 10.1109/WICSA.2015.29

E. Yuan, N. Esfahani, and S. Malek, A Systematic Survey of Self-Protecting Software Systems, ACM Transactions on Autonomous and Adaptive Systems, vol.8, issue.4, pp.1-1741, 2014.
DOI : 10.1109/TSMCB.2006.885306

C. Fetzer, Building Critical Applications Using Microservices, IEEE Security & Privacy, vol.14, issue.6, pp.86-89, 2016.
DOI : 10.1109/MSP.2016.129

Y. Sun, S. Nanda, and T. Jaeger, Security-as-a-Service for Microservices-Based Cloud Applications, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), pp.50-57, 2015.
DOI : 10.1109/CloudCom.2015.93

C. Otterstad and T. Yarygina, Low-Level Exploitation Mitigation by Diverse Microservices, pp.49-56, 2017.
DOI : 10.1007/978-1-4614-0977-9_4

URL : https://hal.archives-ouvertes.fr/hal-01677618

T. Yarygina and A. H. Bagge, Overcoming Security Challenges in Microservice Architectures, 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE), 2018.
DOI : 10.1109/SOSE.2018.00011

N. Stakhanova, S. Basu, and J. Wong, A taxonomy of intrusion response systems, International Journal of Information and Computer Security, vol.1, issue.1/2, pp.169-184, 2007.
DOI : 10.1504/IJICS.2007.012248

URL : http://lib.dr.iastate.edu/cgi/viewcontent.cgi?article=1193&context=cs_techreports

M. Osborne and A. Rubinstein, A Course in Game Theory, 1994.

S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya et al., A Survey of Game Theory as Applied to Network Security, 2010 43rd Hawaii International Conference on System Sciences, pp.1-10, 2010.
DOI : 10.1109/HICSS.2010.35

URL : http://ais.cs.memphis.edu/files/papers/hicss43.pdf

S. A. Zonouz, H. Khurana, W. H. Sanders, and T. M. Yardley, RRE: A game-theoretic intrusion response and recovery engine, IEEE TPDS, vol.25, issue.2, pp.395-406, 2014.
DOI : 10.1109/dsn.2009.5270307

URL : http://www.crhc.uiuc.edu/PERFORM/Papers/USAN_papers/08ZON01.pdf

M. A. Noureddine, A. Fawaz, W. H. Sanders, and T. Ba¸sarba¸sar, A Game-Theoretic Approach to Respond to Attacker Lateral Movement, pp.294-313, 2016.
DOI : 10.1109/TPDS.2013.211

, Snort official web-site, www.snort.org, [Accessed Feb, 2018.

G. Folino and P. Sabatino, Ensemble based collaborative and distributed intrusion detection systems: A survey, Journal of Network and Computer Applications, vol.66, pp.1-16, 2016.
DOI : 10.1016/j.jnca.2016.03.011

A. Avizienis, J. C. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.
DOI : 10.1109/TDSC.2004.2

T. Jackson, B. Salamat, A. Homescu, K. Manivannan, G. Wagner et al., Compiler-Generated Software Diversity, pp.77-98, 2011.

C. B. Simmons, S. G. Shiva, H. S. Bedi, and V. Shandilya, ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy, IFIP International Information Security Conference, pp.344-365, 2013.
DOI : 10.1109/IPDPS.2002.1016475

URL : https://hal.archives-ouvertes.fr/hal-01463837