Research Article

Moving Target Defense Based on Adaptive Forwarding Path Migration for Securing the SCADA Network

Table 4

Difference between various cyber defense techniques.

TechniqueSecurity featuresThreats addressedThreats unaddressed

Network-based MTDOperational confidentiality, state obfuscation, attack surface extensionDoS, MitM, spoofing, insider threat, targeted attackReplay and random attacks
Firewall/IDS/IPSMonitoring, exfiltration, signature analysis, anomalous behavior detectionMalicious traffic filteringMasquerade, authentication attack
DNP3secAuthentication and integrity checkReplay, spoofing, modification, nonrepudiationDoS, traffic attack, zero day exploits
Scalence/VPNsec/GRE tunnellingConfidentiality, transparent application-level securityIPSec-application layer attackAPT, rootkit, trapdoor, stealth DoS, phishing attack, network layer attack, SSLSec-application layer attack