×

IP jamming systems utilizing virtual dispersive networking

  • US 8,955,110 B1
  • Filed: 01/14/2011
  • Issued: 02/10/2015
  • Est. Priority Date: 01/14/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method for IP jamming utilizing a plurality of electronic devices each having software loaded thereon configured to spawn a virtual machine that virtualizes network capabilities of that respective electronic device, the method comprising:

  • (a) spawning, at a first electronic device, a first virtual machine that virtualizes network capabilities of the first electronic device such that a first virtual network connection is provided;

    (b) spawning, at a first electronic device, a second virtual machine that virtualizes network capabilities of the first electronic device such that a second virtual network connection is provided;

    (c) spawning, at a first electronic device, a third virtual machine that virtualizes network capabilities of the first electronic device such that a third virtual network connection is provided;

    (d) spawning, at a second electronic device, a fourth virtual machine that virtualizes network capabilities of the second electronic device such that a fourth virtual network connection is provided;

    (e) spawning, at a third electronic device, a fifth virtual machine that virtualizes network capabilities of the third electronic device such that a fifth virtual network connection is provided;

    (f) spawning, at a fourth electronic device, a sixth virtual machine that virtualizes network capabilities of the fourth electronic device such that a sixth virtual network connection is provided;

    (g) communicating, from the first electronic device utilizing the first virtual machine spawned at the first electronic device, networking information for a network attack to the second electronic device via the fourth virtual machine;

    (h) communicating, from the first electronic device utilizing the second virtual machine spawned at the first electronic device, networking information for a network attack to the third electronic device via the fifth virtual machine;

    (i) communicating, from the first electronic device utilizing the third virtual machine spawned at the first electronic device, networking information for a network attack to the fourth electronic device via the sixth virtual machine;

    (j) spawning, at the second electronic device, a seventh virtual machine that virtualizes network capabilities of the second electronic device such that a seventh virtual network connection is provided;

    (k) spawning, at the third electronic device, an eighth virtual machine that virtualizes network capabilities of the third electronic device such that an eighth virtual network connection is provided;

    (l) spawning, at the fourth electronic device, a ninth virtual machine that virtualizes network capabilities of the fourth electronic device such that a ninth virtual network connection is provided;

    (m) commencing, by the second electronic device utilizing the seventh virtual machine, a network attack using the networking information received via the fourth virtual machine by communicating packets over the seventh virtual network connection;

    (n) commencing, by the third electronic device utilizing the eighth virtual machine, the network attack using the networking information received via the fifth virtual machine by communicating packets over the eighth virtual network connection;

    (o) commencing, by the third electronic device utilizing the ninth virtual machine, the network attack using the networking information received via the sixth virtual machine by communicating packets over the ninth virtual network connection;

    (p) communicating, from the first electronic device to the second electronic device via virtual network connections of the first and second electronic devices, instructions to modify the commenced network attack;

    (q) communicating, from the first electronic device to the third electronic device via virtual network connections of the first and third electronic devices, instructions to modify the commenced network attack;

    (r) communicating, from the first electronic device to the fourth electronic device via virtual network connections of the first and fourth electronic devices, instructions to modify the commenced network attack; and

    (s) adapting, by the second, third and fourth electronic devices in response to the received instructions to modify the network attack, operations forming part of the commenced network attack.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×