×

Cloud protection techniques

  • US 10,341,383 B2
  • Filed: 01/12/2018
  • Issued: 07/02/2019
  • Est. Priority Date: 10/28/2011
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable storage medium comprising executable instructions that when executed by one or more processors perform a method to:

  • detect a security event indicating an intruder is operating within a source environment;

    migrate resources of the source environment to a target environment;

    generate fake resources to represent the resources within the source environment and creating a fake processing environment of the source environment with the fake resource operational within the fake processing environment as a combination of fake services, fake systems, fake directories, and fake data stores; and

    log actions taken by the intruder against the fake resources during migration of the resources to the target environment.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×