System and method for computer security
First Claim
Patent Images
1. A method for providing security for a computer network, comprising:
- automatically generating content for a file system for a first computer associated with the network, wherein automatically generating content comprises, for at least a subset of the generated content, selecting through an automated process and without human intervention a corresponding value for each of one or more inputs of at least one template comprising fictitious content, the fictitious content comprising at least one of a decoy user name, a decoy domain name, and a decoy host name;
creating a directory within the first computer;
copying the file system of the first computer into the directory;
routing a user who attempts to gain unauthorized access to a second computer associated with the network to the directory in the first computer, wherein the routing is specified by a policy indicating that the user is to be routed to the directory in the first computer in the event the user attempts to access at least one of;
a specified port and a specified service; and
employing processes running outside of the directory to screen requests by the user to access files to prevent the user from detecting processes used to monitor the user.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and method are disclosed for providing security for a computer network. Content is generated for a computer associated with the network. It is determined whether a user should be routed to the generated content. If it is determined that the user should be routed to the generated content, the user is so routed.
176 Citations
12 Claims
-
1. A method for providing security for a computer network, comprising:
-
automatically generating content for a file system for a first computer associated with the network, wherein automatically generating content comprises, for at least a subset of the generated content, selecting through an automated process and without human intervention a corresponding value for each of one or more inputs of at least one template comprising fictitious content, the fictitious content comprising at least one of a decoy user name, a decoy domain name, and a decoy host name; creating a directory within the first computer; copying the file system of the first computer into the directory; routing a user who attempts to gain unauthorized access to a second computer associated with the network to the directory in the first computer, wherein the routing is specified by a policy indicating that the user is to be routed to the directory in the first computer in the event the user attempts to access at least one of;
a specified port and a specified service; andemploying processes running outside of the directory to screen requests by the user to access files to prevent the user from detecting processes used to monitor the user. - View Dependent Claims (2, 3, 4)
-
-
5. A system for providing security for a computer network, comprising:
-
a computer processor configured to; generate content automatically for a file system for a first computer associated with the network, wherein automatically generating content comprises, for at least a subset of the generated content, selecting through an automated process and without human intervention a corresponding value for each of one or more inputs of at least one template comprising fictitious content, the fictitious content comprising at least one of a decoy user name, a decoy domain name, and a decoy host name; create a directory within the first computer; copy the file system of the first computer into the directory; route a user who attempts to gain unauthorized access to a second computer associated with the network to the directory in the first computer, wherein the routing is specified by a policy indicating that the user is to be routed to the directory in the first computer in the event the user attempts to access at least one of;
a specified port and a specified service; andemploy processes running outside of the directory to screen requests by the user to access files to prevent the user from detecting processes used to monitor the user. - View Dependent Claims (6, 7, 8)
-
-
9. A computer program product for providing security for a computer network, the computer program product being embodied in a non-transitory computer readable storage medium and comprising computer instructions for:
-
automatically generating content for a file system for a first computer associated with the network, wherein automatically generating content comprises, for at least a subset of the generated content, selecting through an automated process and without human intervention a corresponding value for each of one or more inputs of at least one template comprising fictitious content, the fictitious content comprising at least one of a decoy user name, a decoy domain name, and a decoy host name; creating a directory within the first computer; copying the file system of the first computer into the directory; routing a user who attempts to gain unauthorized access to a second computer associated with the network to the directory in the first computer, wherein the routing is specified by a policy indicating that the user is to be routed to the directory in the first computer in the event the user attempts to access at least one of;
a specified port and a specified service; andemploying processes running outside of the directory to screen requests by the user to access files to prevent the user from detecting processes used to monitor the user. - View Dependent Claims (10, 11, 12)
-
Specification