System and method for creation, deployment and management of augmented attacker map
First Claim
1. A system for network surveillance to detect attackers, comprising:
- a deception management server within a network of resources, comprising;
a deployment processor managing and planting one or more decoy attack vectors in one or more of the resources in the network, wherein an attack vector is an object in memory or storage of a first resource that may be used to access a second resource; and
a notification processor; and
one or more decoy servers accessible from resources in the network, each decoy server comprising a forensic alert processor that issues an alert when a specific resource in the network accesses that decoy server via one or more of the decoy attack vectors planted in that specific resource by said deployment processor, the alert causing said deception management server to transmit a real-time forensic application to the specific resource, wherein the forensic application, when launched in the specific resource, identifies a process running within the specific resource that is accessing that decoy server, logs the activities performed by the thus-identified process in a forensic report, and transmits the forensic report to said deception management server, wherein said notification processor transmits to a notification server a notification that a resource in the network accessed a decoy server, and information in the forensic report provided by the forensic application, in response to said deception management server receiving the forensic report.
1 Assignment
0 Petitions
Accused Products
Abstract
A network surveillance system including a deception management server within a network, including a deployment module managing and planting decoy attack vectors in network resources, wherein an attack vector is an object in memory or storage of a first resource that may be used to access a second resource, and decoy servers accessible from resources in the network via decoy attack vectors, each decoy server including a forensic alert module causing a real-time forensic application to be transmitted to a destination resource in the network when the decoy server is being accessed by a specific resource in the network via a decoy attack vector, wherein the forensic application, when launched in the destination resource, identifies a process running within the specific resource that is accessing that decoy server, logs the activities performed by the thus-identified process in a forensic report, and transmits the forensic report to the deception management server.
-
Citations
14 Claims
-
1. A system for network surveillance to detect attackers, comprising:
-
a deception management server within a network of resources, comprising; a deployment processor managing and planting one or more decoy attack vectors in one or more of the resources in the network, wherein an attack vector is an object in memory or storage of a first resource that may be used to access a second resource; and a notification processor; and one or more decoy servers accessible from resources in the network, each decoy server comprising a forensic alert processor that issues an alert when a specific resource in the network accesses that decoy server via one or more of the decoy attack vectors planted in that specific resource by said deployment processor, the alert causing said deception management server to transmit a real-time forensic application to the specific resource, wherein the forensic application, when launched in the specific resource, identifies a process running within the specific resource that is accessing that decoy server, logs the activities performed by the thus-identified process in a forensic report, and transmits the forensic report to said deception management server, wherein said notification processor transmits to a notification server a notification that a resource in the network accessed a decoy server, and information in the forensic report provided by the forensic application, in response to said deception management server receiving the forensic report. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of network surveillance to detect attackers, comprising:
-
planting one or more decoy attack vectors in one or more resources in a network of computers, wherein an attack vector is an object in memory or storage of a first resource that may be used to access a second resource; recognizing that a decoy server in the network is being accessed by a specific resource in the network via one or more of the decoy attack vectors planted in the specific resource by said planting; causing a real-time forensic application to be transmitted to the specific resource, wherein the forensic application, when launched on the specific resource, is operative to; identify a process running within the specific resource that is accessing the decoy server; log the activities performed by the thus-identified process in a forensic report; and transmit the forensic report to a deception management server; and transmitting to a notification server a notification that a resource in the network accessed a decoy server, and information in the forensic report provided by the forensic application, in response to the deception management server receiving the forensic report. - View Dependent Claims (10, 11, 12)
-
-
13. A system for network surveillance to detect attackers, the system comprising:
-
a deception management server within a network of resources that is governed by an access governor that authorizes users to access the resources in the network based on user credentials, the deception management server comprising; a deployment processor, planting one or more decoy user credentials in one or more of the resources in the network; and a notification processor; and a forensic alert processor that issues an alert when said access governor recognizes an attempt by a first resource in the network to access a second resource in the network via one or more of the decoy credentials planted in the first resource by said deployment processor, the alert causing said deception management server to transmit a real-time forensic application to the first resource, wherein the forensic application, when launched in the first resource, identifies a process running within the first resource that is attempting to access the second resource, logs the activities performed by the thus-identified process in a forensic report, and transmits the forensic report to said deception management server, wherein said notification processor transmits to a notification server a notification that the first resource attempted to access the second resource via decoy credentials, and information in the forensic report provided by the forensic application, in response to said deception management server receiving the forensic report.
-
-
14. A method of network surveillance to detect attackers, comprising:
-
planting one or more decoy user credentials in one or more resources in a network of resources that is governed by an access governor that authorizes users to access the resources in the network based on user credentials; recognizing an attempt by a first resource in the network to access a second resource in the network via one or more of the decoy user credentials planted in the first resource by said planting; in response to said recognizing, causing a real-time forensic application to be transmitted to the first resource, wherein the forensic application, when launched, is operative to; identify a process running within the first resource that is accessing the decoy server; log the activities performed by the thus-identified process; and transmit the log to a deception management server; and transmitting to a notification server a notification that a resource in the network accessed a decoy server, and information in the forensic report provided by the forensic application, in response to the deception management server receiving the forensic report.
-
Specification