Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 3759626, 25 pages
https://doi.org/10.1155/2018/3759626
Review Article

Moving Target Defense Techniques: A Survey

1China National Digital Switching System Engineering & Technological Research Center, Zhengzhou, Henan Province 450001, China
2Henan Key Laboratory of Information Security, Zhengzhou, Henan Province 450001, China

Correspondence should be addressed to Cheng Lei; moc.liamg@05121gnehciel

Cheng Lei and Hong-Qi Zhang contributed equally to this work.

Received 6 February 2018; Revised 30 May 2018; Accepted 15 July 2018; Published 22 July 2018

Academic Editor: Jesús Díaz-Verdejo

Copyright © 2018 Cheng Lei et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [8 citations]

The following is the list of published articles that have cited the current article.

  • Yuyang Zhou, Guang Cheng, Shanqing Jiang, Ying Hu, Yuyu Zhao, and Zihan Chen, “A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense,” Proceedings of the 6th ACM Workshop on Moving Target Defense - MTD'19, pp. 57–66, . View at Publisher · View at Google Scholar
  • Michal Piskozub, Riccardo Spolaor, Mauro Conti, and Ivan Martinovic, “On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks,” Proceedings of the 6th ACM Workshop on Moving Target Defense - MTD'19, pp. 1–12, . View at Publisher · View at Google Scholar
  • Danilo Vasconcellos Vargas, Wai Kyi Kyi Oo, Hiroshi Koide, and Kouichi Sakurai, “A new design for evaluating moving target defense system,” Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018, pp. 561–563, 2018. View at Publisher · View at Google Scholar
  • Francesca Nizzi, Tommaso Pecorella, Flavio Esposito, Laura Pierucci, and Romano Fantacci, “IoT Security via Address Shuffling: The Easy Way,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 3764–3774, 2019. View at Publisher · View at Google Scholar
  • Johannes Sianipar, Christoph Meinel, and Muhammad Sukmana, “Moving sensitive data against live memory dumping, spectre and meltdown attacks,” 26th International Conference on Systems Engineering, ICSEng 2018 - Proceedings, 2019. View at Publisher · View at Google Scholar
  • Yawen Wang, Yunfei Guo, Zehua Guo, Thar Baker, and Wenyan Liu, “CLOSURE: A cloud scientific workflow scheduling algorithm based on attack-defense game model,” Future Generation Computer Systems, 2019. View at Publisher · View at Google Scholar
  • Jianjun Zheng, and Akbar Siami Namin, “A Survey on the Moving Target Defense Strategies: An Architectural Perspective,” Journal of Computer Science and Technology, vol. 34, no. 1, pp. 207–233, 2019. View at Publisher · View at Google Scholar
  • Wai Kyi Kyi Oo, Hiroshi Koide, and Kouichi Sakurai, “Analyzing the Effect of Moving Target Defense for a Web System,” International Journal of Networking and Computing, vol. 9, no. 2, pp. 188–200, 2019. View at Publisher · View at Google Scholar