×

Multi-factor deception management and detection for malicious actions in a computer network

  • US 10,623,442 B2
  • Filed: 04/02/2018
  • Issued: 04/14/2020
  • Est. Priority Date: 06/08/2015
  • Status: Active Grant
First Claim
Patent Images

1. A network surveillance method to detect attackers, comprising:

  • planting one or more honeytokens in one or more resources in a network of computers in which users access the resources in the network based on credentials, wherein a honeytoken is an object in memory or storage of a first resource that may be used by an attacker to access a second resource using decoy credentials, comprising;

    planting a first honeytoken in a first resource, R1, used to access a second resource, R2, using first decoy credentials; and

    planting a second honeytoken in R1, used to access a third resource, R3, using second decoy credentials; and

    alerting that an attacker is intruding the network only in response to both (i) an attempt to access R2 using the first decoy credentials, and (ii) a subsequent attempt to access R3 using the second decoy credentials.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×