SYSTEMS, METHODS, AND MEDIA FOR GENERATING BAIT INFORMATION FOR TRAP-BASED DEFENSES
First Claim
Patent Images
1. A method for detecting unauthorized activities, comprising:
- recording, using a hardware processor, data sent over a network;
generating, using the hardware processor, a bait email message based on the data sent over the network that references a name of a bait document and a location where the bait document is stored;
sending the bait email message from a first decoy account to a second decoy account;
monitoring the bait document to detect whether the bait document has been accessed; and
in response to detecting that the bait document has been accessed, indicating that the security of at least one of the first decoy account and the second decoy account have been compromised.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and media for generating bait information for trap-based defenses are provided. In some embodiments, methods for generating bait information for trap-based defenses include: recording historical information of a network; translating the historical information; and generating bait information by tailoring the translated historical information.
16 Citations
18 Claims
-
1. A method for detecting unauthorized activities, comprising:
-
recording, using a hardware processor, data sent over a network; generating, using the hardware processor, a bait email message based on the data sent over the network that references a name of a bait document and a location where the bait document is stored; sending the bait email message from a first decoy account to a second decoy account; monitoring the bait document to detect whether the bait document has been accessed; and in response to detecting that the bait document has been accessed, indicating that the security of at least one of the first decoy account and the second decoy account have been compromised. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for detecting unauthorized activities, comprising:
a hardware processor that is programmed to; record data sent over a network; generate a bait email message based on the data sent over the network that references a name of a bait document and a location where the bait document is stored; send the bait email message from a first decoy account to a second decoy account; monitor the bait document to detect whether the bait document has been accessed; and in response to detecting that the bait document has been accessed, indicate that the security of at least one of the first decoy account and the second decoy account have been compromised. - View Dependent Claims (8, 9, 10, 11, 12)
-
13. A non-transitory computer-readable medium containing computer-executable instructions that, when executed by a processor, causes the processor to perform a method for detecting unauthorized activities, the method comprising:
-
recording data sent over a network; generating a bait email message based on the data sent over the network that references a name of a bait document and a location where the bait document is stored; sending the bait email message from a first decoy account to a second decoy account; monitoring the bait document to detect whether the bait document has been accessed; and in response to detecting that the bait document has been accessed, indicating that the security of at least one of the first decoy account and the second decoy account have been compromised. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification