NETWORK STIMULATION ENGINE
First Claim
1. A method of projecting a false apparent computer network view for protecting a real computer network against hackers, the method comprising:
- receiving into a physical computer network one or more requests for internet protocol (IP) addresses of nodes in the physical computer network;
determining, using at least one processor operatively coupled with a memory, that a response to the one or more requests should present a false apparent view of a network configuration of the physical computer network;
selecting a definition of a false apparent view of the network configuration based on the determination;
building the response to the one or more requests, the response including at least one false IP address for a node in the computer network in accordance with the selected false apparent view; and
sending the response through the computer network.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods, devices, and systems are disclosed for simulating a large, realistic computer network. Virtual actors statistically emulate the behaviors of humans using networked devices or responses and automatic functions of networked equipment, and their stochastic actions are queued in buffer pools by a behavioral engine. An abstract machine engine creates the minimal interfaces needed for each actor, and the interfaces then communicate persistently over a network with each other and real and virtual network resources to form realistic network traffic. The network can respond to outside stimuli, such as a network mapping application, by responding with false views of the network in order to spoof hackers, and the actors can respond by altering a software defined network upon which they operate.
28 Citations
20 Claims
-
1. A method of projecting a false apparent computer network view for protecting a real computer network against hackers, the method comprising:
-
receiving into a physical computer network one or more requests for internet protocol (IP) addresses of nodes in the physical computer network; determining, using at least one processor operatively coupled with a memory, that a response to the one or more requests should present a false apparent view of a network configuration of the physical computer network; selecting a definition of a false apparent view of the network configuration based on the determination; building the response to the one or more requests, the response including at least one false IP address for a node in the computer network in accordance with the selected false apparent view; and sending the response through the computer network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of projecting a false apparent computer network view for protecting a real computer network against hacker mapping tools, the method comprising:
-
receiving a definition of a first false apparent view of a network configuration; receiving a definition of a second false apparent view of a network configuration, the first and second false apparent views of network configurations being different from an actual, physical configuration of a physical computer network; receiving into the physical computer network a request from a network mapping tool executed by a user for internet protocol (IP) addresses for nodes in the computer network; determining, using at least one processor operatively coupled with a memory, that the user should view a false view of the physical configuration regarding the IP addresses of the nodes in the computer network, the determining based on a network location of the user where security may be compromised; selecting between the first or second false apparent view based on the network location of the user; building a response to the request based on the selected first or second false apparent view, the response including at least one false IP address for a node in the computer network in accordance with the selected first or second false apparent view; and sending the response to the network mapping tool through the computer network. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. The method of obfuscating a network for protecting a real computer network against hackers, the method comprising:
-
receiving definitions of false apparent views of a network configuration of a physical computer network; selecting, using at least one processor operatively coupled with a memory, among the definitions of the false apparent views of the network configuration; receiving a request from a network mapping tool for internet protocol (IP) addresses for nodes in the computer network; building a response to the request based on a currently selected definition of one of the false apparent views of the network; and sending the response to the network mapping tool through the computer network. - View Dependent Claims (18, 19, 20)
-
Specification