Research

Automated Moving Target Defense

Published research, white papers, and the science behind Phoenix.

Published Research

01
Academic Paper·May 2025

ADA: Automated Moving Target Defense for AI Workloads via Ephemeral Infrastructure-Native Rotation in Kubernetes

Akram Sheriff, Ken Huang, Zsolt Nemeth, Madjid Nakhjiri

Introduces the Adaptive Defense Agent (ADA), an AMTD system that continuously rotates AI workloads at the infrastructure level using Kubernetes pods. Applies chaos engineering principles to achieve zero-trust security through rotation-based defense.

02
Academic Paper·2025

Proactive Security for Large-Scale AI Inference: Adaptive Container Orchestration at the Edge

Akram Sheriff, Zsolt Nemeth, Ken Huang

Introduces Adaptive NIMs — applying AMTD to AI inference environments. Addresses security and reliability risks of static NVIDIA NIM deployments through dynamic container rotation, runtime configuration mutation, and telemetry-driven decision-making.

03
Technical White Paper·2025

Adaptive Security for AI Infrastructure with Automated Moving Target Defense

Zsolt Nemeth

Formalizes AMTD for AI systems with mathematical threat models, measurable improvements in Time-to-Compromise and Attack Success Rate, and practical deployment strategies including Leader-Worker Sets and inference rotation.

04
White Paper·December 2025

Phoenix: Adaptive Containers — The Mathematical Imperative for Proactive Defense, Rooted in Game Theory

R6 Security

Frames AMTD through von Neumann’s Minimax Theorem and game theory. Demonstrates why static defense is mathematically irrational and how Phoenix implements the optimal mixed strategy through continuous container rotation.

90% of attacks are reconnaissance and planning. AMTD makes that planning worthless.

The Methodology

What is Automated Moving Target Defense?

Moving Target Defense continuously shifts the attack surface to increase uncertainty for adversaries. Instead of presenting a static target, MTD systems dynamically change configurations, network addresses, and runtime environments. AMTD removes human decision-making from the loop — Phoenix uses telemetry, risk signals, and chaos engineering principles to autonomously rotate, mutate, and regenerate workloads.

Five Defense Mechanisms
01

Container Rotation

Pods are replaced at random or telemetry-driven intervals. No foothold survives the next rotation cycle.

02

Runtime Mutation

Environment variables, network identities, and service labels change continuously. Reconnaissance data becomes stale before it can be used.

03

Workload Regeneration

Compromised workloads are automatically replaced with known-good baselines. The system heals itself as a matter of course.

04

Network Obfuscation

IPs, service endpoints, and routing paths shift dynamically. Lateral movement becomes impossible when the network map is constantly redrawn.

05

Panic Mutation

When suspicious activity is detected, Phoenix triggers immediate workload rotation. The compromised environment is destroyed before the attacker completes their objective.

Phoenix vs. Traditional Security
R6 PhoenixTraditional
01Proactive preventionReactive detection
02Agentless, K8s-nativeAgent-heavy, bolted-on
03Continuous mutationStatic perimeter
041-2% overheadHeavy resource consumption
05Purpose-built for AI + K8sGeneric cloud security
06Self-healing infrastructureManual incident response
07Zero-trust by designTrust boundaries added later

Ready to see it in action?