Cloud protection techniques
First Claim
Patent Images
1. A method, comprising:
- creating a feigned cloud environment within a source cloud environment upon detection of an event from within the source environment, wherein creating further includes creating the feigned could environment on a set of cooperating computing resources including one or more processor-enabled and memory-enabled machines having one or more software and computing resources;
migrating services from the source cloud environment to a target cloud environment, wherein creating and migrating further includes processing the creating of the feigned cloud environment in parallel and concurrently with processing the migrating of the services; and
tracking activity of an intruder within the feigned cloud environment during the migration.
3 Assignments
0 Petitions
Accused Products
Abstract
Cloud protection techniques are provided. A security breach is detected in a source cloud environment. An enterprise system processing in the source cloud environment is immediately locked down and is dynamically migrated to a target cloud environment. While the enterprise system is migrating, the source cloud environment creates a fake environment with fake resources within the source cloud environment to dupe an intruder having access as a result of the security breach. Metrics and logs are gathered with respect to activities of the intruder within the source cloud environment.
24 Citations
17 Claims
-
1. A method, comprising:
-
creating a feigned cloud environment within a source cloud environment upon detection of an event from within the source environment, wherein creating further includes creating the feigned could environment on a set of cooperating computing resources including one or more processor-enabled and memory-enabled machines having one or more software and computing resources; migrating services from the source cloud environment to a target cloud environment, wherein creating and migrating further includes processing the creating of the feigned cloud environment in parallel and concurrently with processing the migrating of the services; and tracking activity of an intruder within the feigned cloud environment during the migration. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving an instruction from a source cloud processing environment to provision servers from the source cloud processing environment within a target cloud processing environment; shutting services down within the source cloud processing environment; provisioning fake services within the source cloud processing environment to make the cloud processing environment a honey pot cloud processing environment to entice intruders to access the fake services, wherein provisioning includes provisioning the honey pot cloud processing environment on a set of cooperating computing resources including one or more processor-enabled and memory-enabled machines having one or more software and computing resources; and migrating and provisioning the services that were shut down for execution in the target cloud processing environment, wherein provisioning and migrating further includes processing the provisioning of the fake services in parallel and concurrently with processing the migrating of the services. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification