Decoy network technology with automatic signature generation for intrusion detection and intrusion prevention systems
First Claim
1. A method for protecting a primary computer network with automatic signature generation for intrusion detection and intrusion prevention systems, comprising:
- providing a decoy network connection on a primary computer network to a decoy that includes a decoy operating system comprising a functional operating system hosted on a monitoring/intercept module that includes a kernel driver coupled with said functional operating system and hidden from an attacker by removing one or more pointers to the kernel driver, wherein the kernel driver is hidden from the attacker by preventing the kernel driver from registering with the decoy operating system;
intercepting a network attack on said primary computer network using the monitoring/intercept module of the decoy, wherein said network attack comprises attack-identifying information that is based on all activities associated with the decoy operating system, where all activities associated with the decoy operating system are assumed to be unauthorized;
processing said attack-identifying information using a processing module connected to the decoy through a second secure computer network to identify said network attack and generate an attack signature, wherein the second secure computer network is distinct from the primary computer network; and
applying said attack signature to a library of signatures contained in an intrusion detection system or intrusion prevention system to control access to said primary computer network.
5 Assignments
0 Petitions
Accused Products
Abstract
Improved methods and systems for decoy networks with automatic signature generation for intrusion detection and intrusion prevention systems. A modular decoy network with front-end monitor/intercept module(s) with a processing back-end that is separate from the protected network. The front-end presents a standard fully functional operating system that is a decoy so that the instigator of an attack is lead to believe a connection has been made to the protected network. The front-end includes a hidden sentinel kernal driver that monitors connections to the system and captures attack-identifying information. The captured information is sent to the processing module for report generation, data analysis and generation of an attack signature. The generated attack signature can then be applied to the library of signatures of the intrusion detection system or intrusion prevention system of the protected network to defend against network based attacks including zero-day attacks.
-
Citations
22 Claims
-
1. A method for protecting a primary computer network with automatic signature generation for intrusion detection and intrusion prevention systems, comprising:
-
providing a decoy network connection on a primary computer network to a decoy that includes a decoy operating system comprising a functional operating system hosted on a monitoring/intercept module that includes a kernel driver coupled with said functional operating system and hidden from an attacker by removing one or more pointers to the kernel driver, wherein the kernel driver is hidden from the attacker by preventing the kernel driver from registering with the decoy operating system; intercepting a network attack on said primary computer network using the monitoring/intercept module of the decoy, wherein said network attack comprises attack-identifying information that is based on all activities associated with the decoy operating system, where all activities associated with the decoy operating system are assumed to be unauthorized; processing said attack-identifying information using a processing module connected to the decoy through a second secure computer network to identify said network attack and generate an attack signature, wherein the second secure computer network is distinct from the primary computer network; and applying said attack signature to a library of signatures contained in an intrusion detection system or intrusion prevention system to control access to said primary computer network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 21, 22)
-
-
8. A system for a protecting a primary computer network with automatic signature generation for intrusion detection and intrusion prevention systems, comprising:
-
a decoy hosted on a primary computer network, wherein said decoy is configured to provide a decoy operating system over a decoy network connection and wherein said decoy operating system comprises a functional operating system hosted on a monitoring/intercept module; a kernel driver coupled with said functional operating system and hidden from an attacker by removing one or more pointers to the kernel driver, wherein the monitoring/intercept module including said kernel driver is configured to intercept a network attack on said primary computer network, and said network attack comprises attack-identifying information that is based on all activities associated with the decoy operating system, where all activities associated with the decoy operating system are assumed to be unauthorized, wherein the kernel driver is hidden from the attacker by preventing the kernel driver from registering with the decoy operating system; a processing module comprising a processor device wherein said processing module is connected to the decoy through a second secure computer network, and wherein said processing module is configured to identify said network attack and generate an attack signature from said attack-identifying information, wherein the second secure computer network is distinct from the primary computer network; and said processing module further configured to apply said attack signature to a library of signatures contained in an intrusion detection system or intrusion prevention system to control access to said primary computer network. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A system for protecting a primary computer network having a library of signatures comprising:
-
means for providing a decoy network connection on a primary computer network to a decoy that includes a decoy operating system comprising a functional operating system hosted on a monitoring/intercept module that includes a kernel driver coupled with said functional operating system and hidden from an attacker by removing one or more pointers to the kernel driver, wherein the kernel driver is hidden from the attacker by preventing the kernel driver from registering with the decoy operating system; means for intercepting a network attack on said primary computer network using the monitoring/intercept module of the decoy, wherein said network attack comprises attack-identifying information that is based on all activities associated with the decoy operating system, where all activities associated with the decoy operating system are assumed to be unauthorized; means for processing said attack-identifying information using a processing module connected to the decoy through a second secure computer network to identify said network attack and generate an attack signature, wherein the second secure computer network is distinct from the primary computer network; and means for applying said attack signature to a library of signatures contained in an intrusion detection system or intrusion prevention system to control access to said primary computer network. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification