Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Applying Moving Target Defense Against Data Theft Ransomware on Windows OS

Version 1 : Received: 13 December 2023 / Approved: 13 December 2023 / Online: 13 December 2023 (05:24:07 CET)

How to cite: Liu, S.; Chen, X. Applying Moving Target Defense Against Data Theft Ransomware on Windows OS. Preprints 2023, 2023120948. https://doi.org/10.20944/preprints202312.0948.v1 Liu, S.; Chen, X. Applying Moving Target Defense Against Data Theft Ransomware on Windows OS. Preprints 2023, 2023120948. https://doi.org/10.20944/preprints202312.0948.v1

Abstract

This study addresses the escalating threat of data theft ransomware, a form of cyberattack that exfiltrates sensitive information from victim networks and demands ransom for its non-disclosure. Unlike traditional crypto-ransomware, data theft ransomware leverages various infiltration techniques to gain unauthorized access and control over critical data assets. The study introduces a novel Moving Target Defense (MTD) framework, specifically designed for the Windows operating system environment, to counter these sophisticated attacks. MTD increases the unpredictability of the system by dynamically altering its configurations, thereby disrupting the adversary's ability to execute successful attacks. Our research includes the development and empirical evaluation of the MTD framework, demonstrating its effectiveness in reducing ransomware operational capabilities through quantitative analysis, qualitative observations, and statistical significance testing. We also explore the challenges and complexities involved in implementing MTD in real-world scenarios and propose strategies to overcome these barriers. The study concludes with recommendations for future research directions and the potential of MTD in enhancing cybersecurity defense mechanisms.

Keywords

Cybersecurity; Data Theft; Moving Target Defense; Ransomware; Risk Mitigation; Windows OS

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.