|
| Technique | Security features | Threats addressed | Threats unaddressed |
|
| Network-based MTD | Operational confidentiality, state obfuscation, attack surface extension | DoS, MitM, spoofing, insider threat, targeted attack | Replay and random attacks |
| Firewall/IDS/IPS | Monitoring, exfiltration, signature analysis, anomalous behavior detection | Malicious traffic filtering | Masquerade, authentication attack |
| DNP3sec | Authentication and integrity check | Replay, spoofing, modification, nonrepudiation | DoS, traffic attack, zero day exploits |
| Scalence/VPNsec/GRE tunnelling | Confidentiality, transparent application-level security | IPSec-application layer attack | APT, rootkit, trapdoor, stealth DoS, phishing attack, network layer attack, SSLSec-application layer attack |
|