“…The examples include platform migrations or system diversity [20,30,46,49], server location migrations [51,158], software stack diversity [161], proxy shuffling [83], or IP mutation [34]. Main Attacks: Most MTD approaches developed for enterprise networks countermeasured worm attacks [51], DDoS [51,83,158], abstracted attacks in an attack-defense game [49], scanning attacks [20,30,34], APT attacks [161], or more sophisticated, multi-stage attacks, including circumvention attacks, deputy attacks, entropy reducing attacks, probing attacks, and incremental attacks [46]. Key Methodologies: Since majority of existing MTD approaches have used game theoretic approaches, many MTD techniques for enterprise networks have used in an attackdefense game where the MTD techniques are used as defense strategies.…”