Three ACM computing conferences have explored Moving Target Defense as a strategy for network and application-level security as well, for instance by rotating IP addresses or dynamically changing network topologies.
[3] Production implementations of MTD are provided by companies for applications including legacy systems, communications, and election security.
[4] Additionally, "active defense measures" are often another term used to define and refer to offensive cyber operations (OCOs) or computer network attacks (CNAs).
Some have defined active defenses as including of deception or honeypots, which seek to confuse attackers with traps and advanced forensics.
[5] Examples of such honeypot technologies include Illusive Networks,[6] TrapX,[7] Cymmetria,[8] Attivo,[9] and others.