×

Detecting network intrusion using a decoy cryptographic key

  • US 8,719,938 B2
  • Filed: 04/09/2012
  • Issued: 05/06/2014
  • Est. Priority Date: 04/09/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • providing a first network device and a second network device of a data network, each of the first network device and the second network device having a decoy cryptographic key and an authentic cryptographic key, wherein the decoy cryptographic key is used to detect unauthorized data being transmitted in the data network, wherein the authentic cryptographic key is used to encrypt authorized data being transmitted in the data network, wherein providing the first network device and the second network device comprises, for each of the first network device and the second network device;

    identifying a respective first region of a respective computer-readable medium as having respective high entropy data based on the respective high entropy data having greater variance than respective low entropy data in a respective second region of the respective computer-readable medium, andstoring the decoy cryptographic key in the respective first region based on the respective high entropy data having the greater variance than the respective low entropy data;

    receiving, by the first network device, data from the second network device, wherein the data is encrypted using the decoy cryptographic key;

    determining, by the first network device, that the data is encrypted using the decoy cryptographic key by determining that the authentic cryptographic key cannot be used to decrypt the data and decrypting the data using the decoy cryptographic key; and

    discarding, by the first network device, the data encrypted using the decoy cryptographic key.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×