Review Article
Moving Target Defense Techniques: A Survey
Table 3
Cross-layer moving target defense transformation mechanism.
| Name | Mechanism Characteristics | Related Technologies | Redundant | Heterogeneous | Random | Timeliness | Deception |
| NMC | √ | | √ | √ | √ | Operating environment randomization, forwarding path transformation, network intrusion detection, virtual machine isolation |
| APOD | | | √ | √ | √ | End information transformation, network intrusion detection, container separation |
| A3 | √ | √ | √ | | √ | Container-based isolation, backup, software randomization |
| TALENT | | √ | √ | √ | | Instruction randomization, security state awareness |
| SDNA | | | √ | √ | √ | IPv6, IP address mutation, authentication, honeypot |
|
|