Decoy network technology with automatic signature generation for intrusion detection and intrusion prevention systems
First Claim
1. A method for a protecting a primary computer network with automatic signature generation for intrusion detection and intrusion prevention systems, comprising:
- providing a decoy network connection on a primary computer network to a decoy operating system comprising a functional operating system hosted on a monitoring/intercept module;
intercepting a network attack on said primary computer network using a sentinel kernal driver coupled with said functional operating system wherein said network attack comprises attack-identifying information;
processing said attack identifying information using a processing module in a second computer network to identify said network attack and generate an attack signature; and
,applying said attack signature to a library of signatures contained in an intrusion detection system or intrusion prevention system on said primary computer network to control access to said primary computer network.
5 Assignments
0 Petitions
Accused Products
Abstract
Improved methods and systems for decoy networks with automatic signature generation for intrusion detection and intrusion prevention systems. A modular decoy network with front-end monitor/intercept module(s) with a processing back-end that is separate from the protected network. The front-end presents a standard fully functional operating system that is a decoy so that the instigator of an attack is lead to believe a connection has been made to the protected network. The front-end includes a hidden sentinel kernal driver that monitors connections to the system and captures attack-identifying information. The captured information is sent to the processing module for report generation, data analysis and generation of an attack signature. The generated attack signature can then be applied to the library of signatures of the intrusion detection system or intrusion prevention system of the protected network to defend against network based attacks including zero-day attacks.
-
Citations
20 Claims
-
1. A method for a protecting a primary computer network with automatic signature generation for intrusion detection and intrusion prevention systems, comprising:
-
providing a decoy network connection on a primary computer network to a decoy operating system comprising a functional operating system hosted on a monitoring/intercept module; intercepting a network attack on said primary computer network using a sentinel kernal driver coupled with said functional operating system wherein said network attack comprises attack-identifying information; processing said attack identifying information using a processing module in a second computer network to identify said network attack and generate an attack signature; and
,applying said attack signature to a library of signatures contained in an intrusion detection system or intrusion prevention system on said primary computer network to control access to said primary computer network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for a protecting a primary computer network with automatic signature generation for intrusion detection and intrusion prevention systems, comprising:
-
a decoy hosted on a primary computer network wherein said decoy is configured to provide a decoy operating system over a decoy network connection and wherein said decoy operating system comprises a functional operating system hosted on a monitoring/intercept module; a sentinel kernal driver coupled with said functional operating system wherein said sentinel is configured to intercept a network attack on said primary computer network wherein said network attack comprises attack identifying information; a processing module comprising a processor wherein said processing module is hosted in a second computer network and wherein said processing module is configured to identify an attack and generate an attack signature from said attack identifying information; and
,said processing module further configured to apply said attack signature to a library of signatures contained in an intrusion detection system or intrusion prevention system on said primary computer network to control access to said primary computer network. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A system for protecting a primary computer network having a library of signatures comprising:
-
means for providing a decoy network connection on a primary computer network to a decoy operating system comprising a functional operating system hosted on a monitoring/intercept module; means for intercepting a network attack on said primary computer network using a sentinel kernal driver coupled with said functional operating system wherein said network attack comprises attack-identifying information; means for processing said attack identifying information using a processing module in a second computer network to identify said network attack and generate an attack signature; and
,means for applying said attack signature to a library of signatures contained in an intrusion detection system or intrusion prevention system on said primary computer network to control access to said primary computer network. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification