Next Article in Journal
DEVS Closure Under Coupling, Universality, and Uniqueness: Enabling Simulation and Software Interoperability from a System-Theoretic Foundation
Previous Article in Journal
The Latest Diagnostic Imaging Technologies and AI: Applications for Melanoma Surveillance Toward Precision Oncology
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Effectiveness Evaluation Method for Hybrid Defense of Moving Target Defense and Cyber Deception

1
Faculty of Cyber Science and Engineering, QuFu Normal University, Qufu 276826, China
2
Faculty of Civil and Transportation Engineering, Southeast University Chengxian College, Nanjing 210088, China
*
Author to whom correspondence should be addressed.
Computers 2025, 14(12), 513; https://doi.org/10.3390/computers14120513
Submission received: 28 October 2025 / Revised: 19 November 2025 / Accepted: 20 November 2025 / Published: 24 November 2025
(This article belongs to the Section ICT Infrastructures for Cybersecurity)

Abstract

Moving Target Defense (MTD) has been proposed as a dynamic defense strategy to address the static and isomorphic vulnerabilities of networks. Recent research in MTD has focused on enhancing its effectiveness by combining it with cyber deception techniques. However, there is limited research on evaluating and quantifying this hybrid defence framework. Existing studies on MTD evaluation often overlook the deployment of deception, which can expand the potential attack surface and introduce additional costs. Moreover, a unified model that simultaneously measures security, reliability, and defense cost is lacking. We propose a novel hybrid defense effectiveness evaluation method that integrates queuing and evolutionary game theories to tackle these challenges. The proposed method quantifies the safety, reliability, and defense cost. Additionally, we construct an evolutionary game model of MTD and deception, jointly optimizing triggering and deployment strategies to minimize the attack success rate. Furthermore, we introduce a hybrid strategy selection algorithm to evaluate the impact of various strategy combinations on security, resource consumption, and availability. Simulation and experimental results demonstrate that the proposed approach can accurately evaluate and guide the configuration of hybrid defenses. Demonstrating that hybrid defense can effectively reduce the attack success rate and unnecessary overhead while maintaining Quality of Service (QoS).

1. Introduction

With the growing complexity and diversity of cyberattacks, traditional static defense mechanisms face significant limitations due to their inherent characteristics of isomorphism [1,2,3]. To address this limitation in defense, MTD has become a prominent research focus in network security. MTD changes the asymmetry between attackers and defenders by continually varying system configurations and attributes. In recent years, research has gradually focused on hybrid defense frameworks combining MTD with cyber deception techniques [4,5,6]. These frameworks’ defence performance is superior to single MTD approaches, enhancing resistance against sophisticated attacks and mitigating the impact on QoS. Consequently, the hybrid defense framework of MTD and cyber deception is rapidly emerging as a key area of research in MTD.
Implementing MTD technologies effectively depends on a rigorous and scientific evaluation of their effectiveness. However, various approaches have been proposed for assessing the performance of MTD mechanisms, including performance evaluation models for both single MTD technology [7,8] and a mixture of multiple MTD technologies [9,10]. Research on evaluating hybrid defense strategies that integrate MTD with cyber deception remains limited. Existing studies evaluating the role of cyber deception in MTD [11] overlook the deployment of cyber deception, which may expand the attack surface, and fail to consider the impact of cyber deception on reliability and cost. Moreover, current evaluation frameworks have not comprehensively investigated how deception techniques can substitute for traditional MTD mechanisms in terms of system reliability and resource overhead. Therefore, there is a pressing need to develop a comprehensive performance evaluation model for hybrid defense technologies that can systematically assess the potential trade-offs between defense efficiency, system robustness, and defense cost.
A trade-off exists between performance and security when deploying MTDs, as with any other security mechanism [12]. Although frequent MTD adaptation can effectively improve system security, it inevitably has an adverse effect on system reliability. In addition, excessive defense deployment will also increase the cost of system resources. Most existing evaluation and qualification models focus primarily on security and reliability [13,14], often overlooking a comprehensive assessment of defense costs. Invalid defense mechanisms occupy shared resources, which may not reduce QoS [15]. Although some prior studies have attempted to integrate defense costs into reliability evaluations [16], such approaches neglect the resource inefficiency and waste introduced by defense mechanisms. Consequently, there is a compelling need for a comprehensive evaluation framework that considers security performance, system reliability, and defense costs.
To address the problems mentioned above, in this context, we propose a hybrid defense framework effectiveness evaluation model grounded in evolutionary game theory and queuing theory. The system is modeled as an M/M/c queuing system, wherein system reliability is assessed through indicators such as request packet loss rate and average queuing time. We define effective service rate as the defense cost metric. Then, we develop an evolutionary game model to optimize MTD and cyber deception deployment strategies, constructing replicator dynamic equations for evolutionary games to find the optimal strategy that balances security, reliability, and costs. By considering system reliability and defense costs, MTD and cyber deception are competing strategies within the defensive architecture. Furthermore, a hybrid strategy selection algorithm is designed to analyze the effects of various combinations of MTD triggering strategies and deception deployment schemes on system security, resource consumption, and service availability. The contributions of this paper are as follows.
  • We propose a hybrid defense framework that combines MTD and cyber deception effectiveness evaluation models based on queuing theory, aiming to achieve an optimal balance among security, reliability, and defense costs by defining defense resource cost indicators.
  • We develop an evolutionary game model to assess the impact of various combinations of MTD and cyber deception strategies on system security, resource overhead, and reliability. By treating MTD and cyber deception as competitive strategies regarding reliability and defense costs, the model aims to enhance system security while maintaining reliability and controlling defense costs.
  • Validation of the analytic model through simulation and experimentation demonstrates that the method can accurately evaluate the effectiveness of the hybrid defense framework, which combines MTD and cyber deception.
The remainder of this paper is organized as follows. We survey the related works in Section 2. We present our evaluation model in Section 3. The results of the experiments and analysis are presented in Section 4. Finally, Section 5 concludes this article.

2. Related Work

This section surveys the state-of-the-art works, including the MTD and cyber deception hybrid defense framework and methods for evaluating the effectiveness of MTD techniques. Table 1 summarizes the research on performance evaluation methods for MTD and they relate to shuffle-based MTD technology (S), diversity-based MTD technology (D), redundant-based MTD technology (R), and hybrid MTD technology (Hybrid).

2.1. Mobile Target Defense(MTD) and Cyber Deception Hybrid Defense Framework

The hybrid defense framework combining MTD and cyber deception misleads attackers by deploying decoys, maximizing the time attackers spend on these decoys while using MTD as an additional layer of protection to enhance overall system security. Ref. [4] proposed a hybrid defense framework for the ICS reconnaissance phase, integrating MTD with cyber deception. On an SDN platform, optimal network shuffling and diversified decoy coordination are employed, alongside dual heterogeneous subnets and adaptive decision-making (active/passive mode), to increase network uncertainty and ensure system availability. Ref. [5] introduced a dynamic defense architecture, DOLOS, combining MTD with cyber deception technology. By integrating fake services and resources into real production systems, it effectively misleads and delays attackers. The system employs a multi-layer isolation mechanism to bolster security, and its efficacy in enhancing the system’s resilience against attacks and prolonging attack duration has been validated across various attack scenarios.

2.2. Methods for Evaluating the Effectiveness of MTD Techniques

There are several classification methods for evaluating the effectiveness of MTD. Reference [11] categorizes these methods into metric-based [10,23], mathematical model-based [8,16,24], and simulation-based [13,25]. We primarily focus on research based on mathematical models. Ref. [8] proposes a quantitative analysis model for MTD under the constraint of concurrent reconfiguration, addressing the lack of unified quantitative indicators and the trade-off between performance and security. Using Continuous-Time Markov Chains (CTMCs) to evaluate resource availability, response time, and attack success probability, the model determines the optimal reconfiguration rate through a utility function, providing a unified analysis framework for comparing different MTD technologies and scenarios. To achieve a balance between system security and availability through time-based virtual machine migration scheduling in cloud environments, ref. [21] proposes a stochastic Petri net model and PyMTDEvauator tool to optimize MTD policy selection.

2.3. Efficiency Evaluation of Hybrid MTD Technology

With the advancement of hybrid MTD technology research, various evaluation methods have emerged to assess combinations of standard MTD techniques (shuffling, diversity, and redundancy). Ref. [17] addresses the lack of a unified and comparable effectiveness evaluation for multiple MTD combinations in cloud environments. It proposes a formal evaluation method based on the graphical security model HARM to assess hybrid defense techniques involving shuffling and redundancy, analyzing the trade-off between security and reliability. Ref. [10] proposes a series of security metrics to measure shuffling or diversity-based MTD methods. Ref. [6] also introduces a series of metrics to evaluate the effectiveness of the diversity-based MTD technique combined with honeypot defense models.
However, these performance analysis models for MTD are limited to single or multiple MTD technologies and are unsuitable for the hybrid defense framework combining MTD with cyber deception. The proposed model can demonstrate the advantages of a hybrid defense framework from three aspects: security, reliability, and defense costs.

3. Hybrid Defense Evaluation Model

This section presents the evaluation model used to evaluate the effectiveness of our hybrid defense framework that combines MTD and cyber deception, as shown in Figure 1. We first model the system, the defense mechanisms, and the behaviour of the attacker, and quantify security, reliability, and service quality. We then detail the evolutionary game model and analyze the competitive interaction between the two defenses. Finally, we design an algorithm to evaluate how different defense strategies affect the system.

3.1. The Quantitative Model of MTD and Cyber Deception

3.1.1. MTD Shuffle Model

The defender uses MTD to reconfigure the attack surface, such as IP address, port, and service fingerprint, thereby disrupting reconnaissance and hindering the progression of the attack chain [2,26]. Specifically, At each interval ι m ( ι m > t R , where t R is the service recovery time), reconfiguration commands are send to n( n 1 , , C ) servers. The frequency of the shuffle is:
f m = 1 ι m
and the achievement rate of MTD requests per unit time is:
λ m = n f m

3.1.2. Cyber Deception Model

The defender deceives and misleads the attacker by deploying and periodically updating decoys. Decoys are first deployed to mislead the attacker [27,28], and then updated every interval ι d to reduce detectability; r decoys are updated each time. The frequency of the update is:
f d = 1 ι d
The decoy update request arrival rate is:
λ d = r f d
The time since the defender’s last ’decoy update’ is:
τ t = t 1 f d f d t , 0 τ t < 1 f d
We can obtain the probability of attackers accessing each decoy server:
γ t = γ 0 1 f d τ t , 0 γ 0 1

3.2. System Model Based on Queuing Theory

We model the system as an M/M/C queue with a Poisson arrival process for data packets [29]. The SDN controller handles three requests: legitimate service λ l , MTD transformation λ m , and bait update λ d . All requests have equal priority and are processed in first come, first served (FCFS) order. The system comprises C parallel servers with average service rates μ . We denote the average queueing delay by W and the system utilization by ρ . We present our assumptions below.
  • Requests queued at the server will be discarded after waiting for W 0 .
  • When the packet loss rate of the system reaches R 0 , we consider the system unusable.
  • After performing MTD shuffle on the server, the connection will be interrupted, making the server temporarily unavailable and requiring waiting for time t R to restore the connection.
  • The average processing time for service requests by the server is t A .
Three types of requests obtain the total arrival rate of system requests:
λ t o t a l = λ l + λ m + λ d
We can obtain the utilization rate of the system:
ρ = λ t o t a l C μ , ρ < 1
And the load of the system:
a = λ t o t a l μ
The probability of all servers being busy is represented by the waiting and dropping formula (Erlang C):
P C , a = a C C ! 1 ρ C C a k = 0 C 1 a k k ! + a C C ! 1 ρ 1 1 ρ
The decay rate of waiting time when all servers are busy:
η = μ C λ t o t a l
Due to the request drop after timeout, the waiting time W = m i n W q , W 0 , where W q is the queue waiting time. We can calculate the probability of requesting immediate service and the probability of requesting waiting:
P W q = 0 = 1 P C , a
P W q > t = P C , a e η t
In summary, the average waiting time is calculated as follows:
W = 0 W 0 P W q > t d t = P C , a 1 e η W 0 η
Due to the request dropout occurring after the timeout, the dropout rate of requests is:
R d = P W > W 0 = P C , a e η W 0
When MTD transformation and bait update requests arrive at the server, they will be queued due to server recovery, service request processing, and other reasons. Therefore, we define effective shuffle intervals ι m and effective decoy update intervals ι d .

3.2.1. Effective Shuffle Interval

The shuffle frequency of each selected server is:
f m = n f m C 1 R d
We can obtain the effective transformation interval through ι m = 1 f m :
ι m = C ι m n 1 R d

3.2.2. Effective Decoy Update Frequency

The effective update frequency for each decoy server is:
f d = f d 1 R d
Similarly, we can obtain the effective decoy update interval:
ι d = ι d 1 R d

3.3. Analysis of Safety

We identify two types of attacks based on research on existing attack behaviours. The first involves continuous high-intensity attacks by the attacker on all potential targets until the system is paralyzed. The second type is a more covert approach, where the attacker conducts prolonged reconnaissance to identify vulnerabilities in specific targets, then executes targeted attacks while adjusting the strategy based on ongoing reconnaissance. From this analysis, we assume two different attack behaviours: fixed strategy attacks and variable strategy attacks.
  • Static strategy attacks: In this attack type, the attacker continuously attacks until all targets are compromised. The base attack success rate increases linearly over time [30].
  • Changing strategy attacks: In this case, the attacker constantly gathers information and adjusts the attack strategy to target specific vulnerabilities more precisely. The base attack success rate grows exponentially [31].
MTD works by frequently changing attributes such as addresses and ports, disrupting the attack chain and slowing down the attack rate. The higher the frequency, the more significant the slowdown. Cyber deception, through bait and its updates, diverts the attacker’s attention and resets their perception, causing the success rate to decrease periodically, although the overall growth pattern remains the same. When combined, MTD and deception create a “slowdown + suppression” effect: MTD provides long-term slowdown, while deception offers periodic suppression. We assume that the attacker’s initial success rate is P 0 . From this, we can derive the attack success rate functions for static strategy attacks P s t , and changing strategy attacks P c t .
P s t = P 0 + 1 r γ t k 0 f m t
P c t = P 0 + 1 r γ t 1 e a t 1 f m
Among them, k 0 is the success rate growth parameter of the static attack strategy, a > 0 is the attacker’s knowledge accumulation rate parameter of the changing attack strategy, and both equations satisfy P s 0 = P c 0 = P 0 .

3.4. Analysis of Defense Cost

Defense requests consume server capacity and reduce the processing available for legitimate services. We account for three effects: (i) service capacity is shared across request types in proportion to their arrival rates; (ii) decoys occupy part of the servers; and (iii) servers executing an MTD reconfiguration are unavailable during their recovery window. The effective service rate for legitimate traffic is:
μ e = μ λ l λ t o t a l 1 r + t R t A n f m C
Among them, μ represents the average service rate of each server; λ 1 λ t o t a l represents the service opportunities obtained by regular services according to the arrival ratio; and the decrease of the effective available servers caused by the number of decoys r and MTD recovery occupation t R t A n f m . The feasibility constraint is:
0 < r + t R t A n f m < C , μ e > 0
On this basis, the effective utilization ρ e and payload a e of normal services are:
ρ e = λ l C μ e
a e = λ l μ e
Moreover, it must meet the ρ e < 1 stability condition. It can be seen that increasing the MTD frequency or increasing the number of decoys will monotonically decrease μ e , thereby increasing ρ e and queuing pressure; reducing the recovery time t R or improving unit service efficiency (reducing t A ) can alleviate this impact.

3.5. Analysis of Reliability

We evaluate reliability using the average waiting time for requests and the request drop rate. Based on the system analysis above, the legitimate service queue can be approximated by an M/M/C model with parameters λ l , μ e , C . Let the Erlang-C (delay) probability:
E r l C a e , C = a e C C ! 1 ρ e k = 0 C 1 a e k k ! + a e C C ! 1 ρ e
The average waiting time for requests is:
W q ¯ = E r l C a e , C C μ e λ l
The system adopts the strategy of “drop when exceeding the threshold” (waiting time threshold W 0 ), and its dropout rate is equal to the probability of waiting time exceeding  W 0 :
R d = Pr { W q > W 0 } = ErlC a e , C exp C μ e λ W 0
So, when R d > R 0 , it is determined that the system is unavailable.

3.6. Evolutionary Game of MTD and Cyber Deception

We consider the defender’s MTD and cyber deception strategies as competitive strategies and construct an evolutionary game model. The system state comes from a queuing model. We build a payoff function that balances security gain, reliability, and cost, set up the optimization problem, and then use replicator dynamics to update strategy probabilities until they converge to optimal trigger and update rates.
N = N m , N d represents the game participants, where N m is MTD strategy, N d is cyber deception strategy.
Θ = W , R d , μ e represents a set of the system status. W represents the average service request waiting time. R d represents the average drop rate of service requests. μ e represents the effective service rate.
S = S m , S d represents a set of defender strategy, where S m , S d denotes the defender adopt MTD strategy and deception strategy. Among them, S m = f m 1 , f m 2 , , F m represent the set of the frequency of sending MTD shuffle requests, S d = f d 1 , f d 2 , , F d represents the set of the frequency of sending decoy update requests. F m and F d are the maximum MTD shuffle and decoy update frequencies.
Q = q f m i , f d j represents the probability function, where q f m i , f d j > 0 denotes the probability of defender adopt frequency f m i to execute MTD shuffle and frequency f d j to update decoy.
U = U s , U c indicates the payoff function. U s f m , f d represents the defender’s payoff when the attacker adopts a fixed strategy. U c f m , f d represents the defender’s payoff when the attacker adopts a variable strategy. The payoff consists of three parts: (1) the effect of reducing the success rate of attacks; (2) the benefit brought by reliability; (3) the defence cost penalty composition. Under the mixed strategy f m i , f d j :
U s q f m i , f d j = 1 1 r γ t k 0 f m i t + 1 W l W 0 R d R 0 f m i F m + f d j F d
U c q f m i , f d j = 1 1 r γ t 1 e a t 1 f m i + 1 W l W 0 R d R 0 f m i F m + f d j F d
To facilitate evolutionary updates, the comprehensive payoff is defined as:
U * = U s + U c
The replicator dynamic equation gives the evolution of mixed strategy probability over time t:
d q ( f m i , f d j ) d t = q ( f m i , f d j ) ( U * f m i , f d j Θ ( Q ) k = 0 F m l = 0 F d q ( f m k , f d l ) U * f m k , f d l Θ ( Q ) )

3.7. Optimization Problem

According to the evaluation game, the defender should maximize the payoff to ensure security, reliability and cost. At the same time, ensure the packet loss rate and service waiting time are within an acceptable range. Thus, the problem can be expressed as:
Problem : max f m i , f d j U s q f m i , f d j + U c q f m i , f d j   s . t . W q ¯ < W 0 R d < R 0

3.8. MTD and Cyber Deception Collaborative Optimization Selection Algorithm

The Algorithm 1 discretises the MTD and decoy update frequencies into a strategy grid. Each strategy pair first uses queueing theory to calculate the effective service rate and reliability for regular services. Then, it incorporates an attack behaviour model to assess the attack success rate, creating an overall payoff matrix. Next, replicator dynamic equations are applied to the strategy grid, continuously shifting probability mass toward higher-reward frequency combinations until it converges to an equilibrium, resulting in the optimal MTD and Cyber deception frequency configuration.
Algorithm 1 MTD and Cyber Deception Collaborative Optimization Selection Algorithm
Input: Constraint thresholds R 0 (max drop rate), W 0 (max waiting time); system parameters C , n , r , μ , λ l , t R , t A , a , k 0 , γ 0 , R 0 , W 0 ; strategy sets S m = { f m 1 , , f m M } and S d = { f d 1 , , f d D }
Output:  f m * (optimal MTD transform frequency), f d * (optimal deception update frequency)
  1: Step 1: Initialize system parameters and strategy space
  2: Initialize system parameters: C , n , r , μ , λ l , t R , t A , a , k 0 , γ 0 , R 0 , W 0 ;
  3: Initialize define strategy spaces: S m = f m 1 ,   f m 2 , ,   F m , S d = f d 1 ,   f d 2 , ,   F d ;
  4: Step 2: Calculate system state and attack success probability
  5: For each strategy pair ( f m i ,   f d j ) :
  6: Compute parameters λ total , P ( C , a ) , W , R d , μ e , ι m , ι d
  7: P attack = P s + P c
  8: Step 3: Construct payoff matrix
  9: For each strategy pair ( f m i ,   f d j ) :
10: U security = 1 P attack .
11: if  W l W 0 and R d R 0 then
12: U service 1 W l / W max R d / R 0 .
13: else
14: U service 100 .
15: end if
16: U cos t = f m i / F m + f d j / F d .
17: U total = U security + U service U cost .
18: A [ i , j ] U total .
19: Step 4: Replicator dynamics on S m × S d
20: function REPLICATORDYNAMICS(Q, A)
21: U avg = i = 1 M j = 1 D q i j A [ i , j ] .
22:   For each strategy pair ( f m i , f d j ) :
23: d Q d t [ i , j ] = q i j A [ i , j ] U avg .
24:    return d Q d t
25: end function
26: Step 5: Evolution to equilibrium and selection
27: Initialize Q = Q 0 with q i j 0 and i , j q i j = 1 ; set Δ t , T , ε , and t = 0 .
28: repeat
29: Q old = Q .
30: d Q d t R EPLICATOR D YNAMICS ( Q old , A ) .
31: Q new = Q old + Δ t · d Q d t .
32:    Project to simplex: set each q i j = max ( q i j , 0 ) , then renormalize so i , j q i j = 1 .
33: Δ Q = i = 1 M j = 1 D | Q new [ i , j ] Q old [ i , j ] | .
34: t t + Δ t ; Q Q new .
35: until Δ Q ε or t T
36: Find indices ( i * , j * ) such that Q [ i * , j * ] is maximal.
37: return f m * f m i * , f d * f d j * .

4. Experiment

4.1. Experimental Setup

We implemented the experiments using SimPy4.11, a Python-based (version 3.8), process-oriented discrete-event engine. We used SimPy4.11 on a dedicated control node to co-schedule workload arrivals, resource reconfiguration, and decoy rotation. A real XenServer8 virtualization environment executes scripted operations on the backend VM pool to enact the reconfigurations and decoy updates. Service requests are emulated by throughput-oriented TCP flows generated with iPerf3, while Nmap and hping3 synthesize active scanning and flooding/probing traffic. Attack intensity and risk thresholds are annotated with reference to public vulnerability databases and Common Vulnerability Scoring System (CVSS) scores. The controller hosts a built-in monitoring process that periodically records metrics such as queueing delay and packet loss rate.
We set the constant parameters in the model as follows. The number of servers C is 20. The maximum waiting time for a request W0 is 6 s. The server recovery wait time t R is 3 s. The average processing time for a service request t A is 2 s. The other constants are a = 1.1 and k 0 = 2 .

4.2. Experimental Results

First, we adjusted the input parameters and evaluated the framework from a security, resource overhead, and availability perspective. We tested under different basic attack success rates. We analyzed how the defense strategy affects the packet loss rate, the average request waiting time, and the effective service rate. We also compared our method with three baseline strategies: no defense, the pure MTD strategy, and the pure deception strategy. The pure MTD indicated that the defender only deployed the shuffle-based MTD technique, and the pure deception strategy indicated that the defender only deployed the decoy.
We set the basic attack success rate at P 0 = 30 % and evaluate how the attacker’s success rate changes over time, as shown in Figure 2. The curve representing the non-defense strategy illustrates the change in attack success rate over time. Due to the attacker’s ability to detect decoys, the success rate of attacks under a pure deception strategy is approximately 90%. Although the pure MTD strategy can effectively mitigate attacks, its restrictions on reliability prevent it from achieving optimal effects. Our method stabilizes at approximately 55%, effectively limiting further growth. This proves that hybrid defense methods can effectively ensure the system’s security compared to pure MTD and deception methods.
Figure 3 presents the change in request waiting time during the attack. Many servers are compromised, and the system cannot process requests effectively without defences. Our method enforces a bound on waiting time and converges to about 3 s. For the other strategies, the average waiting time rises and approaches the maximum limit. Figure 4 compares the average packet loss rate with and without attacks. In the absence of attacks, our method has a slightly higher packet loss rate than no defense and is close to the pure cyber deception strategy. Under attack, the packet loss rates of the pure MTD and pure cyber deception strategies increase rapidly and reach up to 50%. Our method effectively constrained the packet loss rate. This proves that hybrid defense methods can effectively ensure the system’s reliability compared to pure MTD and deception methods.
Figure 5 shows the effective service rate during the attack. As the attack continues, a system without defense suffers server failures and its effective service rate drops sharply. The pure MTD strategy also declines quickly due to the frequent MTD requests. The pure cyber deception strategy updates less often, so its effective service rate decreases slowly. Our method shows a similar downward trend to deception and, with resource overhead constrained, it stabilizes at about 70%. This proves hybrid defense methods can effectively reduce defense costs compared to pure MTD and deception methods.
Then, we varied the attack intensity to evaluate how security, resource overhead, and availability relate under different attack levels. We first adjusted the maximum waiting time limit W 0 to get the relationship between attack success rate and average packet loss rate. Figure 6 and Figure 7 show that when attack traffic is 250 Mbps, lowering the maximum waiting time limit reduces the average packet loss rate. In this case, both the deception method and our method keep the attack success rate low while maintaining service availability. The MTD strategy can suppress the attack success rate, but it cannot sustain normal availability. When attack traffic rises to 500 Mbps, the attack success rate under the cyber deception method increases significantly. In contrast, our method continues to reduce the attack success rate and keeps the system available.
We also present the optimal MTD shuffle frequency and decoy update frequency under different constraints on the maximum waiting time W 0 and maximum packet loss rate R 0 to serve as the basis for the preceding experiments; the results are shown in Table 2.
Finally, we assessed the performance of the hybrid MTD and deception framework across several evaluation metrics in other studies, including attack success rate, average packet loss rate, average service waiting time, and effective service rate, as shown in Table 3. The settings are as follows. A1 is committed to selecting the MTD strategy schedule that can achieve the desired levels of security for the system [21]. A2 focuses on enhancing the security of hybrid MTD technology against multi-phased cyber-attacks and, to some extent, mitigating the performance degradation caused by MTD triggering [19]. A3 has conducted a more comprehensive evaluation of security through several security metrics [9]. A4 evaluates MTD in smart grid, aiming to maximize the generation-cost benefits [32].
The results of the performance show that A1 focuses on considerations of security and reliability, neglecting the costs associated with defense deployment. A2 neglected the consideration of reliability, resulting in an average waiting time that exceeds the standard. A3 achieves the lowest attack success rate but fails to strike a balance between service effectiveness and cost. A4 focuses on benefits and reliability, which can lead to a lack of safety assurance. The framework meets system requirements, and only three criteria are satisfied.
We also measure the change in defense strategies over time. As shown in Figure 8, A1 can balance security and reliability, but raising the MTD shuffle frequency and the decoy update frequency consumes the processing capacity needed for regular services. A2 supports more precise defense deployment, yet lowering the defense frequency leaves security insufficiently protected. A3 seeks to reduce the attack success rate by issuing many MTD shuffle and decoy update requests, but it cannot maintain system reliability or control defense overhead. A4 seeks to ensure the system’s reliability by reducing the defense deployment, but sacrificing security does not improve reliability. Our method has a slightly higher attack success rate than A3 but effectively preserves reliability and keeps defense overhead in check.

5. Conclusions

We propose a performance evaluation method combining queuing and evolutionary game theory in a single framework for hybrid defense with MTD and cyber deception. The method uses an M/M/C queue to model system reliability and defense cost, and uses static and adaptive attack models to describe attack propagation. With evolutionary game theory, we treat MTD and cyber deception as competing strategies and optimize the MTD trigger frequency and the decoy update frequency through replicator dynamics. This creates an integrated analysis and simulation workflow for strategy selection and parameter tuning. Experiments show that the method balances security, availability, and cost under multiple criteria. It provides quantitative guidance for configuring trigger and deployment strategies, reducing attack success rates while limiting unnecessary resource use and maintaining QoS.

Author Contributions

X.Z. developed the main idea and helped revise the manuscript. F.H. (Fangbo Hou) and F.H. (Fangrun Hou) designed the main methods and simulation experiment and wrote the paper. Z.H. helped build the experiment environment. Z.L. and Z.W. helped revise the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by Yangzhou Science and Technology Plan Project (YZ2023200), and Self-Developing Experimental Instrument and Equipment Project of Yangzhou University (zzyq2023zy06).

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Acknowledgments

The authors would like to thank the editor and the reviewers for their constructive comments and suggestions.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Griffioen, P.; Weerakkody, S.; Sinopoli, B. A Moving Target Defense for Securing Cyber-Physical Systems. IEEE Trans. Autom. Control 2021, 66, 2016–2031. [Google Scholar] [CrossRef]
  2. Zhang, T.; Xu, C.; Shen, J.; Kuang, X.; Grieco, L.A. How to Disturb Network Reconnaissance: A Moving Target Defense Approach Based on Deep Reinforcement Learning. IEEE Trans. Inf. Forensics Secur. 2023, 18, 5735–5748. [Google Scholar] [CrossRef]
  3. Zhang, T.; Kong, F.; Deng, D.; Tang, X.; Wu, X.; Xu, C.; Zhu, L.; Liu, J.; Ai, B.; Han, Z.; et al. Moving Target Defense Meets Artificial-Intelligence-Driven Network: A Comprehensive Survey. IEEE Internet Things J. 2025, 12, 13384–13397. [Google Scholar] [CrossRef]
  4. Qin, X.; Jiang, F.; Dong, C.; Doss, R. A hybrid cyber defense framework for reconnaissance attack in industrial control systems. Comput. Secur. 2024, 136, 103506. [Google Scholar] [CrossRef]
  5. Pagnotta, G.; De Gaspari, F.; Hitaj, D.; Andreolini, M.; Colajanni, M.; Mancini, L.V. DOLOS: A Novel Architecture for Moving Target Defense. IEEE Trans. Inf. Forensics Secur. 2023, 18, 5890–5905. [Google Scholar] [CrossRef]
  6. Rehman, Z.; Gondal, I.; Ge, M.; Dong, H.; Gregory, M.; Tari, Z. Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception. Comput. Secur. 2024, 139, 103685. [Google Scholar] [CrossRef]
  7. Yan, J.; Zhou, Y.; Wang, T. A Port-Hopping Technology against Remote Attacks and Its Effectiveness Evaluation. Electronics 2023, 12, 2477. [Google Scholar] [CrossRef]
  8. Connell, W.; Menascé, D.A.; Albanese, M. Performance Modeling of Moving Target Defenses with Reconfiguration Limits. IEEE Trans. Dependable Secur. Comput. 2021, 18, 205–219. [Google Scholar] [CrossRef]
  9. Masud, M.T.; Keshk, M.; Moustafa, N.; Turnbull, B.; Susilo, W. Vulnerability defence using hybrid moving target defence in Internet of Things systems. Comput. Secur. 2025, 153, 104380. [Google Scholar] [CrossRef]
  10. Sharma, D.P. Evaluating Moving Target Defense Methods Using Time to Compromise and Security Risk Metrics in IoT Networks. Electronics 2025, 14, 2205. [Google Scholar] [CrossRef]
  11. Ma, D.; Tang, Z.; Sun, X.; Guo, L.; Wang, L.; Chen, K. Game Theory Approaches for Evaluating the Deception-based Moving Target Defense. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA, 7 November 2022. [Google Scholar] [CrossRef]
  12. Menasce, D. Security performance. IEEE Internet Comput. 2003, 7, 84–87. [Google Scholar] [CrossRef]
  13. Torquato, M.; Maciel, P.; Vieira, M. PyMTDEvaluator: A Tool for Time-Based Moving Target Defense Evaluation: Tool description paper. In Proceedings of the 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE), Wuhan, China, 25–28 October 2021; pp. 357–366. [Google Scholar] [CrossRef]
  14. Jalowski, Ł.; Zmuda, M.; Rawski, M. A Survey on Moving Target Defense for Networks: A Practical View. Electronics 2022, 11, 2886. [Google Scholar] [CrossRef]
  15. Zambianco, M.; Facchinetti, C.; Doriguzzi-Corin, R.; Siracusa, D. Resource-Aware Cyber Deception for Microservice-Based Applications. IEEE Trans. Serv. Comput. 2024, 17, 4211–4224. [Google Scholar] [CrossRef]
  16. Nguyen, T.A.; Kim, M.; Lee, J.; Min, D.; Lee, J.W.; Kim, D. Performability evaluation of switch-over Moving Target Defence mechanisms in a Software Defined Networking using stochastic reward nets. J. Netw. Comput. Appl. 2022, 199, 103267. [Google Scholar] [CrossRef]
  17. Alavizadeh, H.; Hong, J.B.; Kim, D.S.; Jang-Jaccard, J. Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud. Comput. Secur. 2021, 102, 102091. [Google Scholar] [CrossRef]
  18. Moghaddam, T.; Kim, M.; Cho, J.H.; Lim, H.; Moore, T.J.; Nelson, F.F.; Kim, D.D. A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks. In Proceedings of the 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Baltimore, MD, USA, 27–30 June 2022; pp. 103–110. [Google Scholar] [CrossRef]
  19. Kim, M.; Cho, J.H.; Lim, H.; Moore, T.J.; Nelson, F.F.; Ko, R.K.L.; Dongseong Kim, D. Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments. In Proceedings of the 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS), Guangzhou, China, 5–9 December 2022; pp. 276–286. [Google Scholar] [CrossRef]
  20. Chen, Y.; Zhang, C.; Zhang, T. Spatial-Temporal Decisions for Moving Target Defense Game Subject to Quality of Service Constraints. In Proceedings of the 2023 4th International Conference on Computer Engineering and Intelligent Control (ICCEIC), Guangzhou, China, 20–22 October 2023; pp. 210–215. [Google Scholar] [CrossRef]
  21. Torquato, M.; Maciel, P.; Vieira, M. Evaluation of time-based virtual machine migration as moving target defense against host-based attacks. J. Syst. Softw. 2025, 219, 112222. [Google Scholar] [CrossRef]
  22. Rashid, A.; Such, J. Effectiveness of Moving Target Defenses for Adversarial Attacks in ML-Based Malware Detection. IEEE Trans. Dependable Secur. Comput. 2025, 22, 3885–3900. [Google Scholar] [CrossRef]
  23. Ge, M.; Cho, J.H.; Kim, D.; Dixit, G.; Chen, I.R. Proactive Defense for Internet-of-things: Moving Target Defense with Cyberdeception. ACM Trans. Internet Technol. 2021, 22, 1–31. [Google Scholar] [CrossRef]
  24. Seo, S.; Moon, H.; Lee, S.; Kim, D.; Lee, J.; Kim, B.; Lee, W.; Kim, D. D3GF: A Study on Optimal Defense Performance Evaluation of Drone-Type Moving Target Defense Through Game Theory. IEEE Access 2023, 11, 59575–59598. [Google Scholar] [CrossRef]
  25. Gao, C.; Wang, Y.; Xiong, X.; Zhao, W. MTDCD: An MTD Enhanced Cyber Deception Defense System. In Proceedings of the 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), Chongqing, China, 18–20 June 2021; Volume 4, pp. 1412–1417. [Google Scholar] [CrossRef]
  26. Etxezarreta, X.; Garitano, I.; Iturbe, M.; Zurutuza, U. Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems. Wirel. Netw. 2024, 30, 5077–5091. [Google Scholar] [CrossRef]
  27. Li, H.; Guo, Y.; Sun, P.; Wang, Y.; Huo, S. An optimal defensive deception framework for the container-based cloud with deep reinforcement learning. IET Inf. Secur. 2022, 16, 178–192. [Google Scholar] [CrossRef]
  28. Javadpour, A.; Ja’fari, F.; Taleb, T.; Shojafar, M.; Benza?d, C. A comprehensive survey on cyber deception techniques to improve honeypot performance. Comput. Secur. 2024, 140, 103792. [Google Scholar] [CrossRef]
  29. Li, Z.; Jin, H.; Zou, D.; Yuan, B. Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment. IEEE Trans. Parallel Distrib. Syst. 2020, 31, 695–706. [Google Scholar] [CrossRef]
  30. Li, Q.; Huang, H.; Li, R.; Lv, J.; Yuan, Z.; Ma, L.; Han, Y.; Jiang, Y. A comprehensive survey on DDoS defense systems: New trends and challenges. Comput. Netw. 2023, 233, 109895. [Google Scholar] [CrossRef]
  31. Roy, S.; Sharmin, N.; Acosta, J.C.; Kiekintveld, C.; Laszka, A. Survey and Taxonomy of Adversarial Reconnaissance Techniques. Acm Comput. Surv. 2022, 55, 1–38. [Google Scholar] [CrossRef]
  32. Zhang, Z.; Tian, Y.; Deng, R.; Ma, J. A Double-Benefit Moving Target Defense Against Cyber-Physical Attacks in Smart Grid. IEEE Internet Things J. 2022, 9, 17912–17925. [Google Scholar] [CrossRef]
Figure 1. Evaluation framework.
Figure 1. Evaluation framework.
Computers 14 00513 g001
Figure 2. The attack success rate under different defense strategies.
Figure 2. The attack success rate under different defense strategies.
Computers 14 00513 g002
Figure 3. Average waiting time under different defense strategies.
Figure 3. Average waiting time under different defense strategies.
Computers 14 00513 g003
Figure 4. Packet loss rate under different defense strategies.
Figure 4. Packet loss rate under different defense strategies.
Computers 14 00513 g004
Figure 5. Effective service rate under different defense strategies.
Figure 5. Effective service rate under different defense strategies.
Computers 14 00513 g005
Figure 6. Packet loss rate and attack success rate under 250 Mbps attack traffic.
Figure 6. Packet loss rate and attack success rate under 250 Mbps attack traffic.
Computers 14 00513 g006
Figure 7. Packet loss rate and attack success rate under 500 Mbps attack traffic.
Figure 7. Packet loss rate and attack success rate under 500 Mbps attack traffic.
Computers 14 00513 g007
Figure 8. The variation in MTD shuffle frequency and decoy update frequency over time.
Figure 8. The variation in MTD shuffle frequency and decoy update frequency over time.
Computers 14 00513 g008
Table 1. Survey of MTD-related Literature and Study Areas.
Table 1. Survey of MTD-related Literature and Study Areas.
YearLiteratureStudy Areas
SDRHybrid
2021Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud [17]
2022A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks [18]
2022Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments [19]
2022Performability evaluation of switch-over Moving Target Defence mechanisms in a Software Defined Networking using stochastic reward nets [16]
2023Spatial-Temporal Decisions for Moving Target Defense Game Subject to Quality of Service Constraints [20]
2024Proactive defense mechanism: Enhancing IoT security through diversity-based MTD and cyber deception [6]
2025Evaluation of time-based virtual machine migration as moving target defense against host-based attacks [21]
2025Evaluating Moving Target Defense Methods Using Time-to-Compromise and Security Risk Metrics in IoT Networks [10]
2025Effectiveness of Moving Target Defenses for Adversarial Attacks in ML-Based Malware Detection [22]
2025Vulnerability defence using hybrid moving target defence in Internet of Things systems [9]
Table 2. The optimal triggering interval(s) under different constraints of maximum packet loss rate R 0 and maximum waiting time W 0 .
Table 2. The optimal triggering interval(s) under different constraints of maximum packet loss rate R 0 and maximum waiting time W 0 .
Metric R 0 W 0
20%25%30%3 s4 s5 s6 s
MTD shuffle frequency41.5 s33.4 s25 s41.5 s33.4 s28.7 s25 s
Decoy update frequency68 s51.7 s42.6 s68 s60.5 s54 s42.6 s
Table 3. Performance of Hybrid Defense Framework under Different Metrics Constraints.
Table 3. Performance of Hybrid Defense Framework under Different Metrics Constraints.
Attack Success RateAverage Packet Loss Rate ( R 0 = 30 %)Average Waiting Time ( W 0 = 6 s)Average Effective Service Rate
A137.61%26.42%3.06 s55.67%
A235.56%58.16%4.04 s71.36%
A329.07%69.70%4.52 s48.31%
A443.55%53.12%3.97 s72.43%
Ours38.20%22.01%2.97 s79.66%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hou, F.; Hou, F.; Zang, X.; Hua, Z.; Liu, Z.; Wu, Z. Effectiveness Evaluation Method for Hybrid Defense of Moving Target Defense and Cyber Deception. Computers 2025, 14, 513. https://doi.org/10.3390/computers14120513

AMA Style

Hou F, Hou F, Zang X, Hua Z, Liu Z, Wu Z. Effectiveness Evaluation Method for Hybrid Defense of Moving Target Defense and Cyber Deception. Computers. 2025; 14(12):513. https://doi.org/10.3390/computers14120513

Chicago/Turabian Style

Hou, Fangbo, Fangrun Hou, Xiaodong Zang, Ziyang Hua, Zhang Liu, and Zhe Wu. 2025. "Effectiveness Evaluation Method for Hybrid Defense of Moving Target Defense and Cyber Deception" Computers 14, no. 12: 513. https://doi.org/10.3390/computers14120513

APA Style

Hou, F., Hou, F., Zang, X., Hua, Z., Liu, Z., & Wu, Z. (2025). Effectiveness Evaluation Method for Hybrid Defense of Moving Target Defense and Cyber Deception. Computers, 14(12), 513. https://doi.org/10.3390/computers14120513

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop