SYSTEM AND METHOD FOR VOIP HONEYPOT FOR CONVERGED VOIP SERVICES
First Claim
1. A method of addressing cyber threats enabled by convergence of data and communications services in an enterprise network, the method comprising a data processor executing computer instructions stored on a non-transitory computer readable storage medium to perform the steps of:
- (a) intercepting suspicious incoming VoIP calls from the Internet to the enterprise network, and directing the suspicious incoming VOIP calls to a VoIP honeypot that acts as a network decoy and responds automatically during call sessions for the suspicious incoming VOIP calls while tracing the suspicious incoming VOIP calls; and
(b) intercepting suspicious outgoing VoIP calls from the enterprise network to the Internet, and directing the suspicious outgoing VOIP calls to the VoIP honeypot that acts as a network decoy that responds automatically during call sessions for the suspicious outgoing VOIP calls while tracing the suspicious outgoing VOIP calls.
21 Assignments
0 Petitions
Accused Products
Abstract
Disclosed herein are systems, methods, and computer-readable storage media for a honeypot addressing cyber threats enabled by convergence of data and communication services in an enterprise network. Suspicious incoming VoIP calls from the Internet to the enterprise network are intercepted and directed to a VoIP honeypot that acts as a network decoy and responds automatically during call sessions for the suspicious incoming VOIP calls while tracing the suspicious incoming VOIP calls. Suspicious outgoing VoIP calls from the enterprise network to the Internet are also intercepted and directed to the VoIP honeypot. Moreover, an unsolicited VoIP call is redirected to the VoIP honeypot when the unsolicited VoIP call has been received by a user agent in the enterprise network and a human user of the user agent confirms that the unsolicited VoIP call was unsolicited.
71 Citations
20 Claims
-
1. A method of addressing cyber threats enabled by convergence of data and communications services in an enterprise network, the method comprising a data processor executing computer instructions stored on a non-transitory computer readable storage medium to perform the steps of:
-
(a) intercepting suspicious incoming VoIP calls from the Internet to the enterprise network, and directing the suspicious incoming VOIP calls to a VoIP honeypot that acts as a network decoy and responds automatically during call sessions for the suspicious incoming VOIP calls while tracing the suspicious incoming VOIP calls; and (b) intercepting suspicious outgoing VoIP calls from the enterprise network to the Internet, and directing the suspicious outgoing VOIP calls to the VoIP honeypot that acts as a network decoy that responds automatically during call sessions for the suspicious outgoing VOIP calls while tracing the suspicious outgoing VOIP calls. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for addressing cyber threats enabled by convergence of data and communications services in an enterprise network, the system comprising:
-
a network computer including a data processor and a non-transitory computer-readable storage medium storing computer instructions that, when executed by the data processor, perform the steps of; (a) intercepting suspicious incoming VoIP calls from the Internet to the enterprise network, and directing the suspicious incoming VOIP calls to a VoIP honeypot that acts as a network decoy and responds automatically during call sessions for the suspicious incoming VOIP calls while tracing the suspicious incoming VOIP calls; and (b) intercepting suspicious outgoing VoIP calls from the enterprise network to the Internet, and directing the suspicious outgoing VOIP calls to the VoIP honeypot that acts as a network decoy that responds automatically during call sessions for the suspicious outgoing VOIP calls while tracing the suspicious outgoing VOIP calls. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable storage medium storing computer instructions that, when executed by a data processor, perform a method of addressing cyber threats enabled by convergence of data and communications services in an enterprise network by the steps of:
-
(a) intercepting suspicious incoming VoIP calls from the Internet to the enterprise network, and directing the suspicious incoming VOIP calls to a VoIP honeypot that acts as a network decoy and responds automatically during call sessions for the suspicious incoming VOIP calls while tracing the suspicious incoming VOIP calls; and (b) intercepting suspicious outgoing VoIP calls from the enterprise network to the Internet, and directing the suspicious outgoing VOIP calls to the VoIP honeypot that acts as a network decoy that responds automatically during call sessions for the suspicious outgoing VOIP calls while tracing the suspicious outgoing VOIP calls. - View Dependent Claims (20)
-
Specification