A Survey of Moving Target Defenses for Network Security

Network defenses based on traditional tools, techniques, and procedures (TTP) fail to account for the attacker’s inherent advantage present due to the static nature of network services and configurations. To take away this asymmetric advantage, Moving Target Defense (MTD) continuously shifts the configuration of the underlying system, in turn reducing the success rate of cyberattacks. In this survey, we analyze the recent advancements made in the development of MTDs and highlight (1) how these defenses can be defined using common terminology, (2) can be made more effective with the use of artificial intelligence techniques for decision making, (3) be implemented in practice and (4) evaluated. We first define an MTD using a simple and yet general notation that captures the key aspects of such defenses. We then categorize these defenses into different sub-classes depending on what they move, when they move and how they move. In trying to answer the latter question, we showcase the use of domain knowledge and game-theoretic modeling can help the defender come up with effective and efficient movement strategies. Second, to understand the practicality of these defense methods, we discuss how various MTDs have been implemented and find that networking technologies such as Software Defined Networking and Network Function Virtualization act as key enablers for implementing these dynamic defenses. We then briefly highlight MTD test-beds and case-studies to aid readers who want to examine or deploy existing MTD techniques. Third, our survey categorizes proposed MTDs based on the qualitative and quantitative metrics they utilize to evaluate their effectiveness in terms of security and performance. We use well-defined metrics such as risk analysis and performance costs for qualitative evaluation and metrics based on Confidentiality, Integrity, Availability (CIA), attack representation, QoS impact, and targeted threat models for quantitative evaluation. Finally, we show that our categorization of MTDs is effective in identifying novel research areas and highlight directions for future research.

[1]  Richard Kissel,et al.  Glossary of Key Information Security Terms , 2014 .

[2]  Mohammed Samaka,et al.  Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).

[3]  Ehab Al-Shaer,et al.  Taxonomy of conflicts in network security policies , 2006, IEEE Communications Magazine.

[4]  Sushil Jajodia,et al.  Time-efficient and cost-effective network hardening using attack graphs , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).

[5]  Dorie Minich,et al.  Content Management System , 2014 .

[6]  Brighten Godfrey,et al.  VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.

[7]  John Homer From Attack Graphs to Automated Configuration Management — An Iterative Approach , 2008 .

[8]  S. P. Shantharajah,et al.  A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms , 2015 .

[9]  Somesh Jha,et al.  Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[10]  Jani Suomalainen,et al.  Towards Micro-Segmentation in 5G Network Security , 2016 .

[11]  Nathaniel Evans,et al.  Multiple OS rotational environment an implemented Moving Target Defense , 2014, 2014 7th International Symposium on Resilient Control Systems (ISRCS).

[12]  Kemal Akkaya,et al.  Mitigating Selective Jamming Attacks in Smart Meter Data Collection using Moving Target Defense , 2017, Q2SWinet@MSWiM.

[13]  Andrew W. Appel,et al.  MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.

[14]  Seungjoon Lee,et al.  Network function virtualization: Challenges and opportunities for innovations , 2015, IEEE Communications Magazine.

[15]  Pratyusa K. Manadhata,et al.  Game Theoretic Approaches to Attack Surface Shifting , 2013, Moving Target Defense.

[16]  Shlomo Zilberstein,et al.  Dynamic Programming for Partially Observable Stochastic Games , 2004, AAAI.

[17]  Sushil Jajodia,et al.  Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.

[18]  Abdullah Al-Dujaili,et al.  Adversarial Deep Learning for Robust Detection of Binary Encoded Malware , 2018, 2018 IEEE Security and Privacy Workshops (SPW).

[19]  Sailik Sengupta,et al.  Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract) , 2016, AAMAS.

[20]  Grenville J. Armitage,et al.  A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.

[21]  Fabien Pouget,et al.  Honeypot-based forensics , 2004 .

[22]  Richard Lippmann,et al.  Practical Attack Graph Generation for Network Defense , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[23]  Peng Xie,et al.  A Self-shielding Dynamic Network Architecture , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[24]  Dijiang Huang,et al.  Moving Target Defense , 2018, Software-Defined Networking and Security.

[25]  Wenbin Zheng,et al.  Intrusion prevention system design , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[26]  Marten van Dijk,et al.  Toward a Theory of Cyber Attacks , 2019, ArXiv.

[27]  Duohe Ma,et al.  Moving Target Network Defense Effectiveness Evaluation Based on Change-Point Detection , 2016 .

[28]  Thomas R. Henderson,et al.  Network Simulations with the ns-3 Simulator , 2008 .

[29]  Daniel R. Simon,et al.  Secure traceroute to detect faulty or malicious routing , 2003, CCRV.

[30]  George Cybenko,et al.  Quantification of moving target cyber defenses , 2015, Defense + Security Symposium.

[31]  Sailik Sengupta,et al.  Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud , 2018, GameSec.

[32]  Duminda Wijesekera,et al.  Scalable, graph-based network vulnerability analysis , 2002, CCS '02.

[33]  Sateesh K. Peddoju,et al.  HIDS: A host based intrusion detection system for cloud computing environment , 2018, Int. J. Syst. Assur. Eng. Manag..

[34]  Satinder Singh,et al.  Computing Stackelberg Equilibria in Discounted Stochastic Games ( Corrected Version ) , 2012 .

[35]  Michael P. Wellman,et al.  Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis , 2018, Secur. Commun. Networks.

[36]  Aiko Pras,et al.  DDoS defense using MTD and SDN , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.

[37]  Fernando M. V. Ramos,et al.  Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.

[38]  Atul Prakash,et al.  Distilling critical attack graph surface iteratively through minimum-cost SAT solving , 2011, ACSAC '11.

[39]  Ehab Al-Shaer,et al.  Toward Network Configuration Randomization for Moving Target Defense , 2011, Moving Target Defense.

[40]  Jeannette M. Wing,et al.  Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.

[41]  Dijiang Huang,et al.  Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments , 2019, IEEE Transactions on Dependable and Secure Computing.

[42]  Radha Poovendran,et al.  A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense , 2015, GameSec.

[43]  Jan Medved,et al.  OpenDaylight: Towards a Model-Driven SDN Controller architecture , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[44]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[45]  Yevgeniy Vorobeychik,et al.  Computing Stackelberg Equilibria in Discounted Stochastic Games , 2012, AAAI.

[46]  Daniel A. Menascé,et al.  Performance Modeling of Moving Target Defenses , 2017, MTD@CCS.

[47]  Prasad Calyam,et al.  Frequency-minimal moving target defense using software-defined networking , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).

[48]  Demosthenis Teneketzis,et al.  Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack Graphs , 2015, MTD@CCS.

[49]  Xiao Han,et al.  Evaluation of Deception-Based Web Attacks Detection , 2017, MTD@CCS.

[50]  Robert J. Ellison,et al.  Attack Trees , 2009, Encyclopedia of Biometrics.

[51]  Russell J. Clark,et al.  Advancing Software-Defined Networks: A Survey , 2017, IEEE Access.

[52]  David E. Culler,et al.  PlanetLab: an overlay testbed for broad-coverage services , 2003, CCRV.

[53]  Eugene H. Spafford,et al.  The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.

[54]  Sushil Jajodia,et al.  A moving target defense mechanism for MANETs based on identity virtualization , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[55]  Fenlin Liu,et al.  An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks , 2017, Secur. Commun. Networks.

[56]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[57]  Scott A. DeLoach,et al.  Investigating the application of moving target defenses to network security , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).

[58]  Kevin M. Carter,et al.  A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses , 2014, MTD '14.

[59]  Sushil Jajodia,et al.  A Moving Target Defense Approach to Disrupting Stealthy Botnets , 2016, MTD@CCS.

[60]  Pavlin Radoslavov,et al.  ONOS: towards an open, distributed SDN OS , 2014, HotSDN.

[61]  Somesh Jha,et al.  End-to-End Software Diversification of Internet Services , 2011, Moving Target Defense.

[62]  Sailik Sengupta,et al.  MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial Attacks with Moving Target Defense , 2017, AAAI Workshops.

[63]  Volodymyr Mosorov,et al.  Nessi2 simulator for large-scale DDoS attack analysis , 2011, Perspective Technologies and Methods in MEMS Design.

[64]  Mohammed Samaka,et al.  Feasibility of Supervised Machine Learning for Cloud Security , 2016, 2016 International Conference on Information Science and Security (ICISS).

[65]  Sushil Jajodia,et al.  SHARE , 2018, ACM Transactions on Internet Technology.

[66]  Vikram S. Adve,et al.  The LLVM Compiler Framework and Infrastructure Tutorial , 2004, LCPC.

[67]  Joshua Taylor,et al.  A Quantitative Framework for Moving Target Defense Effectiveness Evaluation , 2015, MTD@CCS.

[68]  Joshua Taylor,et al.  Automated Effectiveness Evaluation of Moving Target Defenses: Metrics for Missions and Attacks , 2016, MTD@CCS.

[69]  Dong Seong Kim,et al.  Software Defined Stochastic Model for Moving Target Defense , 2016, AECIA.

[70]  Hongwei Shi,et al.  Moving Target Defense for Internet of Things Based on the Zero-Determinant Theory , 2020, IEEE Internet of Things Journal.

[71]  Hongxin Hu,et al.  CHAOS: an SDN-based Moving Target Defense System , 2017, Secur. Commun. Networks.

[72]  Dijiang Huang,et al.  Software-Defined Networking and Security , 2018 .

[73]  L. Shapley,et al.  Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.

[74]  Michael B. Crouse,et al.  Improving the Diversity Defense of Genetic Algorithm-Based Moving Target Approaches , 2012 .

[75]  Heejo Lee,et al.  Scalable attack graph for risk assessment , 2009, 2009 International Conference on Information Networking.

[76]  HoumbSiv Hilde,et al.  Quantifying security risk level from CVSS estimates of frequency and impact , 2010 .

[77]  Pritika Mehra,et al.  A brief study and comparison of Snort and Bro Open Source Network Intrusion Detection Systems , 2012 .

[78]  Per Larsen,et al.  Large-Scale Automated Software Diversity—Program Evolution Redux , 2017, IEEE Transactions on Dependable and Secure Computing.

[79]  Mohsine Eleuldj,et al.  OpenStack: Toward an Open-source Solution for Cloud Computing , 2012 .

[80]  Stefan Rass,et al.  Defending Against Advanced Persistent Threats Using Game-Theory , 2017, PloS one.

[81]  Sanjay Jha,et al.  A Survey of Securing Networks Using Software Defined Networking , 2015, IEEE Transactions on Reliability.

[82]  S. Radack The Common Vulnerability Scoring System (CVSS) , 2007 .

[83]  Sylvia Ratnasamy,et al.  A Survey of Enterprise Middlebox Deployments , 2012 .

[84]  Quanyan Zhu,et al.  Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.

[85]  Corbin Del Carlo Intrusion detection evasion: How Attackers get past the burglar alarm , 2003 .

[86]  Bharat K. Bhargava,et al.  Mayflies: A Moving Target Defense Framework for Distributed Systems , 2016, MTD@CCS.

[87]  Deep Medhi,et al.  SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-tenant Datacenter Environment , 2015, 2015 IEEE International Conference on Dependable Systems and Networks Workshops.

[88]  Fei Li,et al.  Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks , 2016, MTD@CCS.

[89]  Wen Shen,et al.  Spatial-Temporal Moving Target Defense: A Markov Stackelberg Game Model , 2020, AAMAS.

[90]  Dijiang Huang,et al.  NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.

[91]  Somesh Jha,et al.  Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[92]  Scott A. DeLoach,et al.  Mission-oriented moving target defense based on cryptographically strong network dynamics , 2013, CSIIRW '13.

[93]  Sailik Sengupta,et al.  Adaptive MTD Security using Markov Game Modeling , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).

[94]  Dijiang Huang,et al.  MTD Analysis and evaluation framework in Software Defined Network (MASON) , 2018, SDN-NFV@CODASPY.

[95]  Michael E. Locasto,et al.  Software Diversity: Security, Entropy and Game Theory , 2012, HotSec.

[96]  Scott A. DeLoach,et al.  Towards a Theory of Moving Target Defense , 2014, MTD '14.

[97]  Omar Santos,et al.  Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services , 2014 .

[98]  Cheng Lei,et al.  Moving Target Defense Techniques: A Survey , 2018, Secur. Commun. Networks.

[99]  Min Zhu,et al.  B4: experience with a globally-deployed software defined wan , 2013, SIGCOMM.

[100]  Xiang Yu,et al.  Applying Self-Shielding Dynamics to the Network Architecture , 2013, Moving Target Defense.

[101]  Yevgeniy Vorobeychik,et al.  Optimal randomized classification in adversarial settings , 2014, AAMAS.

[102]  Jong Hyuk Park,et al.  MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats , 2014, Symmetry.

[103]  Haifeng Xu,et al.  Deceiving Cyber Adversaries: A Game Theoretic Approach , 2018, AAMAS.

[104]  Michael L. Littman,et al.  Value-function reinforcement learning in Markov games , 2001, Cognitive Systems Research.

[105]  Dijiang Huang,et al.  SDN based Scalable MTD solution in Cloud Network , 2016, MTD@CCS.

[106]  Michael B. Crouse,et al.  Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses , 2015, MTD@CCS.

[107]  Joan Bruna,et al.  Intriguing properties of neural networks , 2013, ICLR.

[108]  Cheng Lei,et al.  Optimal Strategy Selection for Moving Target Defense Based on Markov Game , 2017, IEEE Access.

[109]  Michael P. Wellman,et al.  Empirical Game-Theoretic Analysis for Moving Target Defense , 2015, MTD@CCS.

[110]  Ronald L. Rivest,et al.  FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.

[111]  Gordon Fyodor Lyon,et al.  Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .

[112]  Baosheng Wang,et al.  RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[113]  Scott A. DeLoach,et al.  Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense | NIST , 2012 .

[114]  Guanhua Yan,et al.  Ensuring Deception Consistency for FTP Services Hardened against Advanced Persistent Threats , 2018, MTD@CCS.

[115]  Dong Seong Kim,et al.  Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees , 2012, Secur. Commun. Networks.

[116]  Eric Eide,et al.  Introducing CloudLab: Scientific Infrastructure for Advancing Cloud Architectures and Applications , 2014, login Usenix Mag..

[117]  Minghui Zhu,et al.  Comparing Different Moving Target Defense Techniques , 2014, MTD '14.

[118]  Siv Hilde Houmb,et al.  Quantifying security risk level from CVSS estimates of frequency and impact , 2010, J. Syst. Softw..

[119]  Jin B. Hong,et al.  Assessing the Effectiveness of Moving Target Defenses Using Security Models , 2016, IEEE Transactions on Dependable and Secure Computing.

[120]  Xinming Ou,et al.  A scalable approach to attack graph generation , 2006, CCS '06.

[121]  William W. Streilein,et al.  Survey of Cyber Moving Target Techniques , 2013 .

[122]  Sailik Sengupta,et al.  Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks , 2018, ArXiv.

[123]  P. Mell,et al.  Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme , 2002 .

[124]  Dijiang Huang,et al.  Security policy checking in distributed SDN based clouds , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[125]  Sailik Sengupta,et al.  General Sum Markov Games for Strategic Detection of Advanced Persistent Threats Using Moving Target Defense in Cloud Networks , 2019, GameSec.

[126]  Dijiang Huang,et al.  TRUFL: Distributed Trust Management Framework in SDN , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[127]  Yitzchak M. Gottlieb,et al.  CyberVAN: A Cyber Security Virtual Assured Network testbed , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[128]  Karen A. Scarfone,et al.  A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .

[129]  Thomas Narten,et al.  IPv6 Stateless Address Autoconfiguration , 1996, RFC.

[130]  Ping Chen,et al.  A Study on Advanced Persistent Threats , 2014, Communications and Multimedia Security.

[131]  Joseph G. Tront,et al.  MT6D: A Moving Target IPv6 Defense , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[132]  Jin B. Hong,et al.  Scalable Security Models for Assessing Effectiveness of Moving Target Defenses , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[133]  Jin B. Hong,et al.  Performance Analysis of Scalable Attack Representation Models , 2013, SEC.

[134]  Jin B. Hong,et al.  Optimal Network Reconfiguration for Software Defined Networks Using Shuffle-Based Online MTD , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).

[135]  Azer Bestavros,et al.  Markov Modeling of Moving Target Defense Games , 2016, MTD@CCS.

[136]  Xinming Ou,et al.  Identifying Critical Attack Assets in Dependency Attack Graphs , 2008, ESORICS.

[137]  Sjouke Mauw,et al.  Foundations of Attack Trees , 2005, ICISC.

[138]  Richard Ford,et al.  Heartbleed 101 , 2014, IEEE Security & Privacy.

[139]  Richard Colbaugh,et al.  Predictability-oriented defense against adaptive adversaries , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[140]  Milind Tambe,et al.  From physical security to cybersecurity , 2015, J. Cybersecur..

[141]  Harry G. Perros,et al.  SDN-based solutions for Moving Target Defense network protection , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[142]  Wei Hu,et al.  Moving target defense: state of the art and characteristics , 2016, Frontiers of Information Technology & Electronic Engineering.

[143]  Scott A. DeLoach,et al.  MTD CBITS: Moving Target Defense for Cloud-Based IT Systems , 2017, ESORICS.

[144]  D. Fudenberg,et al.  Digitized by the Internet Archive in 2011 with Funding from Working Paper Department of Economics the Folk Theorem with Imperfect Public Information , 2022 .

[145]  Bhakti Bohara Moving Target Defense Using Live Migration of Docker Containers , 2017 .

[146]  Sailik Sengupta,et al.  A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications , 2017, AAMAS.

[147]  Sushil Jajodia,et al.  An Attack Graph-Based Probabilistic Security Metric , 2008, DBSec.

[148]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[149]  Yulong Wang,et al.  U-TRI: Unlinkability Through Random Identifier for SDN Network , 2017, MTD@CCS.

[150]  Quanyan Zhu,et al.  GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats , 2016, GameSec.

[151]  Dhishan Dhammearatchi,et al.  Next-Generation Firewalls , 2016 .

[152]  Florian Skopik,et al.  Combating advanced persistent threats: From network event correlation to incident detection , 2015, Comput. Secur..

[153]  Danilo Gligoroski,et al.  Bypassing Data Execution Prevention on MicrosoftWindows XP SP2 , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[154]  Akihiro Nakao,et al.  GENI: A federated testbed for innovative network experiments , 2014, Comput. Networks.

[155]  Angelos Stavrou,et al.  MOTAG: Moving Target Defense against Internet Denial of Service Attacks , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[156]  Aswin Chidambaram Pappa Moving target defense for securing smart grid communications: Architectural design, implementation and evaluation , 2016 .

[157]  Jin B. Hong,et al.  A survey on the usability and practical applications of Graphical Security Models , 2017, Comput. Sci. Rev..

[158]  Ratul Mahajan,et al.  Measuring ISP topologies with Rocketfuel , 2004, IEEE/ACM Transactions on Networking.

[159]  Laurent Vanbever,et al.  NetHide: Secure and Practical Network Topology Obfuscation , 2018, USENIX Security Symposium.

[160]  William W. Streilein,et al.  Finding Focus in the Blur of Moving-Target Techniques , 2014, IEEE Security & Privacy.

[161]  Jin B. Hong,et al.  Scalable Security Model Generation and Analysis Using k-importance Measures , 2013, SecureComm.

[162]  Richard Colbaugh,et al.  Web Analytics for Security Informatics , 2011, 2011 European Intelligence and Security Informatics Conference.

[163]  Dijiang Huang,et al.  A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities , 2019, IEEE Communications Surveys & Tutorials.

[164]  Ehab Al-Shaer,et al.  Random Host Mutation for Moving Target Defense , 2012, SecureComm.

[165]  Ehab Al-Shaer,et al.  Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.

[166]  Dijiang Huang,et al.  S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks , 2019, RAID.

[167]  Dijiang Huang,et al.  Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments , 2017, SDN-NFV@CODASPY.

[168]  Julian Jang,et al.  Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[169]  Kemal Akkaya,et al.  Mitigating Crossfire Attacks Using SDN-Based Moving Target Defense , 2016, 2016 IEEE 41st Conference on Local Computer Networks (LCN).

[170]  Martin J. Osborne,et al.  An Introduction to Game Theory , 2003 .