|
Technique | Security features | Threats addressed | Threats unaddressed |
|
Network-based MTD | Operational confidentiality, state obfuscation, attack surface extension | DoS, MitM, spoofing, insider threat, targeted attack | Replay and random attacks |
Firewall/IDS/IPS | Monitoring, exfiltration, signature analysis, anomalous behavior detection | Malicious traffic filtering | Masquerade, authentication attack |
DNP3sec | Authentication and integrity check | Replay, spoofing, modification, nonrepudiation | DoS, traffic attack, zero day exploits |
Scalence/VPNsec/GRE tunnelling | Confidentiality, transparent application-level security | IPSec-application layer attack | APT, rootkit, trapdoor, stealth DoS, phishing attack, network layer attack, SSLSec-application layer attack |
|