“…The Shuffle technique rearranges the system setting in various layers (e..g., address ran-domization, migration, topology rearrangements) [12], [13], [14], [15], [16], [17], [18]. The Diversity technique provides equivalent functions with different implementations (e.g., operating systems, variant inputs and interpreters, variant software stack components) [19], [20], [21], [22], [23], [24], [25], [26]. The Redundancy technique provides multiple replicas of the network components (e.g., services, nodes, or paths) to make multiples of the same function [27], [28], [29], [30], [31], [32].…”