Skip to main navigation Skip to search Skip to main content

Moving target defense for DDos mitigation with shuffling of critical edge(s) connections

  • Amir Javadpour*
  • , Forough Ja’ Fari
  • , Tarik Taleb
  • , Chafika Benzaïd
  • *Corresponding author for this work
  • Senior Cybersecurity Researcher MOSA!C Lab/ICTFICIAL Oy
  • Sharif University of Technology
  • Ruhr University Bochum
  • University of Oulu

Research output: Contribution to journalArticlepeer-review

Abstract

Moving Target Defense (MTD) has as a widely adopted approach to mitigate vulnerability exploitation. It is a widely adopted approach to mitigate the exploitation of vulnerabilities. Its dynamic and proactive nature makes it well-suited for SDNs requiring comprehensive and continuous monitoring. A core objective of MTD is to minimize the number of hosts shuffled while maintaining robust security and low scrambling frequency. This paper introduces a novel approach, the Number of Edge Connections (NoEC) strategy, aimed at mitigating Distributed Denial of Service (DDoS) attacks in a resource-efficient manner. This is achieved by strategically reconfiguring a select group of highly connected hosts known as “Edges” to protect critical assets. This approach enhances analytical clarity and supports informed selection of defense strategies tailored to specific edge deployment scenarios. We designed a system utilizing NoEC and conducted simulations using Mininet. The results show that NoEC reduces the complexity by 55.12 % compared to previous MTD methods while increasing the security level by 15.72 %. Among the techniques, topology randomization and edge node shuffling show the highest disruption effect, validating the approach’s practical viability and robustness in defending edge infrastructures.

Original languageEnglish
Article number104347
JournalJournal of Information Security and Applications
Volume97
DOIs
StatePublished - Mar 2026
Externally publishedYes

Keywords

  • DDoS mitigation
  • Mininet
  • Moving target defense
  • Shuffling edge
  • Software-defined networks

Fingerprint

Dive into the research topics of 'Moving target defense for DDos mitigation with shuffling of critical edge(s) connections'. Together they form a unique fingerprint.

Cite this