Research Article
Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model
Table 2
Description of network attack and defense strategies in the experiment.
| Number | Attack–defense strategies | Strategy description |
| | Reconnaissance | Detect valuable information about target system | | Weaponization | Create targeted attack payloads for target system | | Delivery | Deliver payload to target system | | Exploit | Penetration exploits to trigger malicious code | | Installation | Install malware on target system | | Command and control (C&C) | Remote control of target system through C&C | | Action on objectives | Achieve damage to target system | | Expand damage | Horizontal action in target system to expand scope of attack damage | | IP address hopping | | | Communication port hopping | | | Communication protocol hopping | | | Forwarding path hopping | | | Fingerprint hopping | | | Data storage hopping | | | Monitoring detection | Monitor process behavior using IDS | | Patch upgrade | Repair damaged network resources by installing patches | | Data deletion | Delete related data in the communication service | | Service close | Close current service function |
|
|