×

Managing dynamic deceptive environments

  • US 9,742,805 B2
  • Filed: 01/15/2017
  • Issued: 08/22/2017
  • Est. Priority Date: 06/08/2015
  • Status: Active Grant
First Claim
Patent Images

1. A deception management system (DMS) to detect attackers within a network of computer resources, comprising:

  • a deception deployer planting one or more decoy attack vectors in memory or storage of one or more real resources in the network, an attack vector, of the one or more decoy attack vectors, being an object in a real resource of the network that has a potential to lead an attacker to access or discover a decoy resource of the network;

    a deception adaptor self-triggering modification of activity logs of login access and data editing for one or more decoy resources, the one or more decoy resources appearing to the attacker as being active in the network; and

    an access governor authorizing access to resources in the network, and issuing a notification upon recognizing an attempt to access one or more of the decoy resources of the network via one or more of the decoy attack vectors planted by said deception deployer.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×