Moving Target Defense: Deceit as a Strategy

Digital protections lose effectiveness when an email appears to be from someone you know, or an exploits package is hidden in a publicity banner from a legitimate website.

Traditional antivirus solutions have proven to be pretty ineffective, as they are incapable of analyzing user behavioral patterns, unlike Hadoop. Many victims of ransomware are running exploits even when they have totally up-to-date antivirus
These solutions based on signatures, compare one archive with the signatures of a known virus in their database to determine if it’s dangerous. The signature can be a byte chain in the archive or a cryptographic hash. Only the ransomware that has an audited signature and is in the database can be stopped. Modern attackers know this and create variants of their ransomware, sometimes in a daily manner.

The best alternative to prevent this situation is Hadoop, which allows behavior base detection, and operates under the premise that unknown variants of the same malware behave in similar manner to known threats and that behavior can be detected.
Hadoop is most effective against new variants of malware, but still the exposed area to threats must be either reduce or obscured to reduce the targets vulnerability and reduce the chance of exploits to be detected.
Moving Target Defense (MTD) technology use deceit techniques in favor of the user, to change continuously and in a persistent manner the threat area, hiding application and web browsers vulnerability’s.
This means the useful load of the ransomware can’t activate and becomes useless to cyber criminals, affecting their assertiveness and neutralize the opportunity’s that social engineering brings them to gain the confidence of the user.