×

Decoy network technology with automatic signature generation for intrusion detection and intrusion prevention systems

  • US 8,429,746 B2
  • Filed: 07/17/2006
  • Issued: 04/23/2013
  • Est. Priority Date: 05/22/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method for protecting a primary computer network with automatic signature generation for intrusion detection and intrusion prevention systems, comprising:

  • providing a decoy network connection on a primary computer network to a decoy that includes a decoy operating system comprising a functional operating system hosted on a monitoring/intercept module that includes a kernel driver coupled with said functional operating system and hidden from an attacker by removing one or more pointers to the kernel driver, wherein the kernel driver is hidden from the attacker by preventing the kernel driver from registering with the decoy operating system;

    intercepting a network attack on said primary computer network using the monitoring/intercept module of the decoy, wherein said network attack comprises attack-identifying information that is based on all activities associated with the decoy operating system, where all activities associated with the decoy operating system are assumed to be unauthorized;

    processing said attack-identifying information using a processing module connected to the decoy through a second secure computer network to identify said network attack and generate an attack signature, wherein the second secure computer network is distinct from the primary computer network; and

    applying said attack signature to a library of signatures contained in an intrusion detection system or intrusion prevention system to control access to said primary computer network.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×