×

Deception using distributed threat detection

  • US 10,091,238 B2
  • Filed: 03/02/2017
  • Issued: 10/02/2018
  • Est. Priority Date: 02/11/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method by an enforcement point, the enforcement point communicatively coupled to a first data network and a second data network, the enforcement point not providing services in the second data network, the method comprising:

  • receiving, from a first workload in the second data network, a data packet addressed to a second workload in the second data network, the data packet requesting a service from the second workload;

    determining the data packet is for unauthorized access of the second workload, the determining using at least some of a 5-tuple of the data packet;

    identifying a deception point using the service, the deception point being in the first data network and including a decoy for the service; and

    redirecting the data packet to the deception point in the first data network, the deception point;

    getting the data packet;

    emulating an application providing the service;

    producing a response to the data packet using the emulating and the data packet; and

    providing the response to the first workload such that the response appears to originate from the second workload.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×