×

Responsive deception mechanisms

  • US 10,348,763 B2
  • Filed: 04/25/2017
  • Issued: 07/09/2019
  • Est. Priority Date: 04/26/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by a deception system on a network, comprising:

  • configuring a network interface of the deception system with a list of Media Access Control (MAC) addresses and Internet Protocol (IP) addresses, wherein each MAC address in the list is associated with an IP address in the list, wherein each IP address and associated MAC address represents an address deception, and wherein, when responding to a request for information about a MAC address or an IP address from the list, the deception system adopts the IP address and the MAC address at the network interface in order to respond to the request;

    receiving a packet from the network, wherein the packet is addressed to a particular address deception represented in the list;

    determining that a response to the packet requires more than information about a particular MAC address or a particular IP address that represents the particular address deception;

    identifying a deception mechanism from a plurality of deception mechanisms hosted by the deception system, wherein the deception mechanism emulates a network device;

    starting up the deception mechanism, wherein a running deception mechanism that can respond to the packet is not available until the deception mechanism is started up;

    configuring the deception mechanism to respond to the packet;

    providing the packet to the deception mechanism;

    transmitting a response generated by the deception mechanism onto the network;

    receiving a second packet from the network, wherein the second packet is addressed to the deception mechanism;

    determining an intent associated with the second packet, wherein the intent includes an interaction with the network device emulated by the deception mechanism, wherein the interaction includes responding to the second packet or a subsequent packet; and

    modifying a configuration of the deception mechanism according to the intent, wherein modifying enables the deception mechanism to perform the interaction.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×