preview

Moving Target Technologies

Decent Essays

Moving target technologies is more a different approach to an old problem than a completely new technology; it is creating asymmetric uncertainty in an IT environment as well as across the global networks. It involves resource and address randomization at every level of the operating system, application and network traffic. Moving target technology is used to reduce the attack surface of your protected systems by obfuscation of what can be using randomization where possible. These randomizations can be made easily in some cases such as IP addresses or with third party software in other cases; the entire idea is to modify at irregular intervals system proprieties in order to vary the attack surface. There are a great many dynamic pieces in …show more content…

Your MAC address, IP Address, Host Name and VLAN can all be changed randomly provided you have a system in place to manage it, these changes, if configured correctly, will make mapping of your network much more difficult. There is still the issue of internet routed traffic, if, without source routing, we could ensure every packet takes a different path across the globe without interfering too greatly with file integrity then we would be able to provide an additional layer of security but this has to include multiple gateways out of your network with different ISP’s. (Strom, 2015)
Technical definition There is a separate definition for each segment of the environment but they all have the same principles. Modify regularly and in a controlled fashion and, change with an unpredictable manner, all variables in a manner that will not affect operations. Segments explored in sources include RAM pointers and usage priorities among other things. Moving-Target Defense is a term used to describe all defensive action that reduces the predictability of actions on a system or network. Moving-target technology is a way of protection that mimics polymorphic virus actions which are intended to evade malware detectors. One such idea is entitled symbiotic defense, this is where a separate process runs a process that complements the processes that need protected in a

Get Access