Research Article

Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model

Table 2

Description of network attack and defense strategies in the experiment.

NumberAttack–defense strategiesStrategy description

ReconnaissanceDetect valuable information about target system
WeaponizationCreate targeted attack payloads for target system
DeliveryDeliver payload to target system
ExploitPenetration exploits to trigger malicious code
InstallationInstall malware on target system
Command and control (C&C)Remote control of target system through C&C
Action on objectivesAchieve damage to target system
Expand damageHorizontal action in target system to expand scope of attack damage
IP address hopping
Communication port hopping
Communication protocol hopping
Forwarding path hopping
Fingerprint hopping
Data storage hopping
Monitoring detectionMonitor process behavior using IDS
Patch upgradeRepair damaged network resources by installing patches
Data deletionDelete related data in the communication service
Service closeClose current service function