RESPONSIVE DECEPTION MECHANISMS
First Claim
Patent Images
1. A method, comprising:
- receiving, by a network deception system on a network, a packet from the network;
determining an intent associated with the packet, wherein determining the intent includes examining the contents of the packet, and wherein the intent is associated with a configuration of a network device;
configuring a deception mechanism using the determined intent, wherein the configuration of the deception mechanism using the configuration of the network device; and
responding to the packet using the deception mechanism.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are methods, network devices, and computer-program products for dynamically configuring a deception mechanism in response to network traffic from a possible network threat. In various implementations, a network deception system can receive a packet from a network. The network deception system can determine an intent associated with the packet by examining the contents of the packet. The network deception system can further configure a deception mechanism to respond to the intent, for example with the appropriate network communications, software or hardware configuration, and/or data.
40 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a network deception system on a network, a packet from the network; determining an intent associated with the packet, wherein determining the intent includes examining the contents of the packet, and wherein the intent is associated with a configuration of a network device; configuring a deception mechanism using the determined intent, wherein the configuration of the deception mechanism using the configuration of the network device; and responding to the packet using the deception mechanism. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A network deception system on a network, comprising:
-
one or more processors; and a non-transitory computer-readable medium including instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including; receiving a packet from the network; determining an intent associated with the packet, wherein determining the intent includes examining the contents of the packet, and wherein the intent is associated with a configuration of a network device; configuring a deception mechanism using the determined intent, wherein the configuration of the deception mechanism using the configuration of the network device; and responding to the packet using the deception mechanism. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A computer-program product tangibly embodied in a non-transitory machine-readable storage medium, including instructions that, when executed by one or more processors, cause the one or more processors to:
-
receive, by a network deception system on a network, a packet from the network; determine an intent associated with the packet, wherein determining the intent includes examining the contents of the packet, and wherein the intent is associated with a configuration of a network device; configure a deception mechanism using the determined intent, wherein the configuration of the deception mechanism using the configuration of the network device; and respond to the packet using the deception mechanism.
-
Specification