×

Techniques for detecting advanced security threats

  • US 9,418,222 B1
  • Filed: 09/27/2013
  • Issued: 08/16/2016
  • Est. Priority Date: 09/27/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting a security threat comprising:

  • receiving resource information from a backend server via a network indicating a defined resource to be generated on a plurality of clients, wherein the defined resource to be generated is specified by the backend server based on at least one computing resource characteristic and at least one known usage of at least a first client of the plurality of clients, and wherein the first client is separate from the backend server and associated with a known threat;

    generating the defined resource at the plurality of clients respectively based on the received resource information, wherein the defined resource is a decoy resource different from the received resource information and monitored differently from other client resources;

    implementing the decoy resource automatically on each respective client of the plurality of clients, wherein the implemented decoy resource simulates on the respective client one of a physical computing resource of at least the first client and a virtualized computing resource of at least the first client available to applications executing on at least the first client;

    monitoring system behavior of the respective client having the decoy resource implemented thereon;

    determining by the respective client whether a security event involving the implemented decoy resource has occurred based on the monitored system behavior of the respective client including the at least one computing characteristic and the at least one known usage of at least the first client; and

    generating a report at the respective client including detailed information regarding the security event and the monitored system behavior of the respective client when it has been determined that the security event has occurred and sending the report to the backend server.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×