×

Cloud protection techniques

  • US 8,789,179 B2
  • Filed: 10/28/2011
  • Issued: 07/22/2014
  • Est. Priority Date: 10/28/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method implemented in a non-transitory machine readable storage medium and processed by one or more processors of a source server device and configured to perform the method, comprising:

  • identifying, by the source server device, a security intrusion to a source cloud environment;

    instructing, by the source server device, a cloud protection agent to shut down an enterprise system operating within the source cloud environment;

    migrating, by the source server device, the enterprise system from the source cloud environment to a target cloud environment once the cloud protection agent indicates resources of the enterprise system are ready for migration; and

    creating, by the source server device, a feigned enterprise system within the source cloud environment as migration proceeds, the feigned enterprise system is a fake and partially operational enterprise system that is used to dupe an intruder and to track actions of the intruder to determine what the intruder is doing, who the intruder is, where the intruder came from, and how the intruder penetrated the source cloud environment, the feigned enterprise system created in parallel and concurrently with the migration.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×