On Moving Target Techniques for Network Defense Security
Shouq Mohsen Alnemari1, Sabah M Alzahrani2
1Shouq Mohsen Alnemari*, Department of Cybersecurity, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia.
2Sabah M Alzahrani, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia.
Manuscript received on August 31, 2020. | Revised Manuscript received on January 08, 2021. | Manuscript published on January 30, 2021. | PP: 84-90 | Volume-9 Issue-5, January 2021. | Retrieval Number: 100.1/ijrte.E5111019521 | DOI: 10.35940/ijrte.E5111.019521
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The traditional technologies, tools and procedures of any network cannot be protected from attackers due to the unchanged services and configurations of the networks. To get rid of the asymmetrical feature, Moving Target Defense technique constantly changes the platform conformation which reduces success ratio of the cyberattack. Users are faced with realness with the increase of continual, progressive, and smart attacks. However, the defenders often follow the attackers in taking suitable action to frustrate expected attackers. The moving target defense idea appeared as a preemptive protect mechanism aimed at preventing attacks. This paper conducts a comprehensive study to cover the following aspects of moving target defense, characteristics of target attacks and its limitation, classifications of defense types, major methodologies, promising defense solutions, assessment methods and applications of defense. Finally, we conclude the study and the future concern proposals. The purpose of the study is to give general directions of research regarding critical features of defense techniques to scholars seeking to improve proactive and adaptive moving target defense mechanisms.
Keywords: Survey, moving target defense, network security, Cyber Security.