Even when some network nodes are conquered or compromised, expansion of the attacker’s territory is much harder due to the fact that variation of IP addresses is capable of disrupting the communications between the conquered or compromised network nodes.