Research Article

Moving Target Defense Based on Adaptive Forwarding Path Migration for Securing the SCADA Network

Table 1

Typical network-based MTDs.

ReferencesTechniqueContribution

[5]Random host mutationProviding high-speed and unpredictable IP mutation
[6]SDN-based MTD analysisImplementing MTDs using SDN
[7]Dynamic address solutionEnlarging the changing scopes of terminal hosts
[8]Collaborative mutation including end point mutation and routing mutationImproving the defensive benefit brought about by network mutation
[9]Attack graph-based MTDShuffling network configurations based on the criticality