Blockchain-Enabled Decentralized End Hopping for Proactive Network Defense
Abstract
1. Introduction
- (1)
- A blockchain-based decentralized network-level MTD system model is presented in detail, comprising a dynamic controller and normal servers. The Practical Byzantine Fault Tolerance (PBFT) algorithm is employed to elect the dynamic controller.
- (2)
- The security challenges facing the proposed system are analyzed, and corresponding countermeasures are provided.
- (3)
- Targeted experiments are conducted to evaluate the availability, effectiveness, and security of the proposed decentralized network-level MTD system.
2. Related Work
2.1. Moving Target Defense
2.2. Private Blockchain for Decentralized Control
2.2.1. Public vs. Private Blockchain Architectures
2.2.2. Applications in Trusted Environments
2.2.3. Justification for Private Blockchain in MTD
2.3. Comparative Analysis with State-of-the-Art Solutions
2.3.1. Comparison with IPv6-Based MTD
2.3.2. Comparison with SDN-Based MTD
2.3.3. Forensics and Traceability
3. Model Sketch
3.1. Dynamic Controller Node
3.1.1. Synchronization
- Step 1:
- After the dynamic controller is elected, each authorized End Hopping client receives a notification packet containing the public key of .
- Step 2:
- Each End Hopping server uploads its real-time hopping strategy and user data.
- Step 3:
- The authorized End Hopping client requests access to the End Hopping service by broadcasting a request packet encrypted with the public key of , which includes the client’s own public key.
- Step 4:
- verifies the identity of the client and then randomly selects an End Hopping server as the response server. After encrypting the hopping strategy of with the public key of the client, replies with the encrypted strategy.
- Step 5:
- Based on the hopping strategy received from , the client connects to .
- Step 6:
- After a new controller election round, the synchronization procedure is re-established following the steps described above.
3.1.2. Adaptive Control
3.1.3. Disaster Recovery Mechanism
3.2. Normal Server Node
3.3. Justification for Blockchain Integration
4. Security Analysis
4.1. Security Challenge and Solution
4.1.1. End Hopping Server Security
| Algorithm 1 Penalty mechanism for non-compliant servers. |
| Require: , ; Ensure: , ;
|
4.1.2. Discussion: Privacy and Access Control Challenges
4.1.3. Flooding Attack
4.2. Robustness
5. Experimental Analysis
5.1. Dynamic Controller
5.1.1. Decentralization Test
5.1.2. Robustness Test
5.2. Normal Server
5.2.1. Hopping Rate Test
5.2.2. Disaster Tolerance Recovery
5.3. Network Performance
5.4. Scalability Analysis and Discussion
6. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
| MTD | Moving Target Defense |
| PBFT | Practical Byzantine Fault Tolerance |
References
- Bensaid, R.; Labraoui, N.; Abba Ari, A.A.; Maglaras, L.; Saidi, H.; Abdu Lwahhab, A.M.; Benfriha, S. Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing. Secur. Commun. Netw. 2024, 2024, 6651584. [Google Scholar] [CrossRef]
- AlDossary, N.; AlQahtani, S.; Alzaher, R.; Rahman, A. SYN Flood DoS Detection System Using Time Dependent Finite Automata. Int. J. Comput. Sci. Netw. Secur. 2023, 23, 147–154. [Google Scholar]
- Steinberger, J.; Kuhnert, B.; Dietz, C.; Ball, L.; Sperotto, A.; Baier, H.; Pras, A.; Dreo, G. DDoS defense using MTD and SDN. In Proceedings of the NOMS 2018–2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018; pp. 1–9. [Google Scholar]
- Tan, J.; Jin, H.; Zhang, H.; Zhang, Y.; Chang, D.; Liu, X.; Zhang, H. A survey: When moving target defense meets game theory. Comput. Sci. Rev. 2023, 48, 100544. [Google Scholar] [CrossRef]
- Cho, J.H.; Sharma, D.P.; Alavizadeh, H.; Yoon, S.; Ben-Asher, N.; Moore, T.J.; Kim, D.S.; Lim, H.; Nelson, F.F. Toward proactive, adaptive defense: A survey on moving target defense. IEEE Commun. Surv. Tutor. 2020, 22, 709–745. [Google Scholar] [CrossRef]
- Valdovinos, I.A.; Pérez-Díaz, J.A.; Choo, K.K.R.; Botero, J.F. Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions. J. Netw. Comput. Appl. 2021, 187, 103093. [Google Scholar] [CrossRef]
- Shi, L.; Jia, C.; Lv, S. Research on end hopping for active network confrontation. J.-China Inst. Commun. 2008, 29, 106. [Google Scholar]
- Shi, L.; Du, S.; Miao, Y.; Lan, S. Modeling and performance analysis of satellite network moving target defense system with petri nets. Remote Sens. 2021, 13, 1262. [Google Scholar] [CrossRef]
- Heydari, V. A New Security Framework for Remote Patient Monitoring Devices. In Proceedings of the 2020 International Symposium on Networks, Computers and Communications (ISNCC), Montreal, QC, Canada, 20–22 October 2020; pp. 1–4. [Google Scholar]
- Yoon, S.; Cho, J.H.; Kim, D.S.; Moore, T.J.; Free-Nelson, F.; Lim, H. Attack graph-based moving target defense in software-defined networks. IEEE Trans. Netw. Serv. Manag. 2020, 17, 1653–1668. [Google Scholar] [CrossRef]
- Rodrigues, B.; Scheid, E.; Killer, C.; Franco, M.; Stiller, B. Blockchain signaling system (BloSS): Cooperative signaling of distributed denial-of-service attacks. J. Netw. Syst. Manag. 2020, 28, 953–989. [Google Scholar] [CrossRef]
- Jalowski, Ł.; Zmuda, M.; Rawski, M. A survey on moving target defense for networks: A practical view. Electronics 2022, 11, 2886. [Google Scholar] [CrossRef]
- Sheriff, A.; Huang, K.; Nemeth, Z.; Nakhjiri, M. ADA: Automated Moving Target Defense for AI Workloads via Ephemeral Infrastructure-Native Rotation in Kubernetes. arXiv 2025, arXiv:2505.23805. [Google Scholar]
- Rashid, A.; Such, J. Effectiveness of moving target defenses for adversarial attacks in ml-based malware detection. IEEE Trans. Dependable Secur. Comput. 2025, 22, 3885–3900. [Google Scholar] [CrossRef]
- Sharma, D.P.; Kim, D.S.; Yoon, S.; Lim, H.; Cho, J.H.; Moore, T.J. FRVM: Flexible random virtual IP multiplexing in software-defined networks. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 579–587. [Google Scholar]
- Zhang, T.; Kong, F.; Deng, D.; Tang, X.; Wu, X.; Xu, C.; Zhu, L.; Liu, J.; Ai, B.; Han, Z.; et al. Moving target defense meets artificial intelligence-driven network: A comprehensive survey. IEEE Internet Things J. 2025, 12, 13384–13397. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. White Paper. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 6 February 2026).
- Du, M.; Chen, Q.; Xiao, J.; Yang, H.; Ma, X. Supply chain finance innovation using blockchain. IEEE Trans. Eng. Manag. 2020, 67, 1045–1058. [Google Scholar] [CrossRef]
- Gai, K.; Guo, J.; Zhu, L.; Yu, S. Blockchain meets cloud computing: A survey. IEEE Commun. Surv. Tutor. 2020, 22, 2009–2030. [Google Scholar] [CrossRef]
- Zhaofeng, M.; Lingyun, W.; Xiaochang, W.; Zhen, W.; Weizhe, Z. Blockchain-enabled decentralized trust management and secure usage control of IoT big data. IEEE Internet Things J. 2019, 7, 4000–4015. [Google Scholar] [CrossRef]
- Jo, M.; Hu, K.; Yu, R.; Sun, L.; Conti, M.; Du, Q. Private blockchain in industrial IoT. IEEE Netw. 2020, 34, 76–77. [Google Scholar] [CrossRef]
- Enaya, A.; Fernando, X.; Kashef, R. Survey of Blockchain-Based Applications for IoT. Appl. Sci. 2025, 15, 4562. [Google Scholar] [CrossRef]
- Rajuroy, A. Evaluating the Use of Public vs. Private Blockchains for Secure Data Access. Preprints 2025. Available online: https://www.researchgate.net/publication/392311198_Evaluating_the_Use_of_Public_vs_Private_Blockchains_for_Secure_Data_Access (accessed on 6 February 2026).
- Yeh, L.Y.; Lu, P.J.; Huang, S.H.; Huang, J.L. SOChain: A privacy-preserving DDoS data exchange service over soc consortium blockchain. IEEE Trans. Eng. Manag. 2020, 67, 1487–1500. [Google Scholar] [CrossRef]
- Dabbagh, M.; Choo, K.K.R.; Beheshti, A.; Tahir, M.; Safa, N.S. A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities. Comput. Secur. 2021, 100, 102078. [Google Scholar] [CrossRef]
- Li, Y.; Yu, Y.; Lou, C.; Guizani, N.; Wang, L. Decentralized public key infrastructures atop blockchain. IEEE Netw. 2020, 34, 133–139. [Google Scholar] [CrossRef]
- Miao, Y.; Zhou, M.; Ghoneim, A. Blockchain and AI-based natural gas industrial IoT system: Architecture and design issues. IEEE Netw. 2020, 34, 84–90. [Google Scholar] [CrossRef]
- Shahid, A.; Almogren, A.; Javaid, N.; Al-Zahrani, F.A.; Zuair, M.; Alam, M. Blockchain-based agri-food supply chain: A complete solution. IEEE Access 2020, 8, 69230–69243. [Google Scholar] [CrossRef]
- Zahir, A.; Groshev, M.; Antevski, K.; J. Bernardos, C.; Ayimba, C.; De La Oliva, A. Performance evaluation of Private and Public Blockchains for multi-cloud service federation. In Proceedings of the 25th International Conference on Distributed Computing and Networking, Chennai, India, 4–7 January 2024; pp. 217–221. [Google Scholar]
- Fireblocks. Permissioned and Permissionless Blockchains in Tomorrow’s Financial System. Whitepaper, Fireblocks. 2025. Available online: https://www.fireblocks.com/wp-content/uploads/2025/05/Whitepaper_Permissionless_4.30.pdf (accessed on 6 February 2026).
- Jafarian, J.A.; Al-Shaer, E.; Duan, Q. Openflow random host mutation: Transparent moving target defense using software defined networking. In Proceedings of the First Workshop on Hot Topics in Software Defined Networks, Helsinki, Finland, 13 August 2012; pp. 127–132. [Google Scholar]










| Feature | MT6D [9] | SDN-MTD [15] | Proposed System |
|---|---|---|---|
| Defense Scope | Data Plane (IPv6) | Data Plane (Virtual IP) | Data & Control Plane |
| Controller Architecture | Static/Gateway | Static/Clustered | Dynamic (Elected) |
| Single Point of Failure | High (Sync Server) | High (Controller) | Eliminated (Disaster Recovery) |
| Byzantine Fault Tolerance | No | No | Yes (PBFT) |
| Forensics Capability | Ephemeral (Low) | Log-based (Mutable) | Blockchain (Immutable) |
| Trust Model | Trusted Endpoints | Centralized Trust | Zero-Trust/Consensus |
| Item | Configuration |
|---|---|
| CPU | Intel(R) Core(TM) i7-7700 |
| Operation system | Ubuntu 16.04 |
| Memory | 8G |
| Hard disk | 1T |
| Hopping Rate | Response Time (μs) | Relative Overhead |
|---|---|---|
| Low (1 hop/s) | ≈300 (Baseline) | 1.0× (Ref) |
| Medium (10 hops/s) | ≈450 | ≈1.5× |
| High (100 hops/s) | 1200 | ≈4.0× |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Luo, S.; Li, F.; Shi, L.; Zhao, D. Blockchain-Enabled Decentralized End Hopping for Proactive Network Defense. Telecom 2026, 7, 28. https://doi.org/10.3390/telecom7020028
Luo S, Li F, Shi L, Zhao D. Blockchain-Enabled Decentralized End Hopping for Proactive Network Defense. Telecom. 2026; 7(2):28. https://doi.org/10.3390/telecom7020028
Chicago/Turabian StyleLuo, Shenghan, Fangxiao Li, Leyi Shi, and Dawei Zhao. 2026. "Blockchain-Enabled Decentralized End Hopping for Proactive Network Defense" Telecom 7, no. 2: 28. https://doi.org/10.3390/telecom7020028
APA StyleLuo, S., Li, F., Shi, L., & Zhao, D. (2026). Blockchain-Enabled Decentralized End Hopping for Proactive Network Defense. Telecom, 7(2), 28. https://doi.org/10.3390/telecom7020028

