IP jamming systems utilizing virtual dispersive networking
First Claim
1. A method for IP jamming utilizing a plurality of electronic devices each having software loaded thereon configured to spawn a virtual machine that virtualizes network capabilities of that respective electronic device, the method comprising:
- (a) spawning, at a first electronic device, a first virtual machine that virtualizes network capabilities of the first electronic device such that a first virtual network connection is provided;
(b) spawning, at a first electronic device, a second virtual machine that virtualizes network capabilities of the first electronic device such that a second virtual network connection is provided;
(c) spawning, at a first electronic device, a third virtual machine that virtualizes network capabilities of the first electronic device such that a third virtual network connection is provided;
(d) spawning, at a second electronic device, a fourth virtual machine that virtualizes network capabilities of the second electronic device such that a fourth virtual network connection is provided;
(e) spawning, at a third electronic device, a fifth virtual machine that virtualizes network capabilities of the third electronic device such that a fifth virtual network connection is provided;
(f) spawning, at a fourth electronic device, a sixth virtual machine that virtualizes network capabilities of the fourth electronic device such that a sixth virtual network connection is provided;
(g) communicating, from the first electronic device utilizing the first virtual machine spawned at the first electronic device, networking information for a network attack to the second electronic device via the fourth virtual machine;
(h) communicating, from the first electronic device utilizing the second virtual machine spawned at the first electronic device, networking information for a network attack to the third electronic device via the fifth virtual machine;
(i) communicating, from the first electronic device utilizing the third virtual machine spawned at the first electronic device, networking information for a network attack to the fourth electronic device via the sixth virtual machine;
(j) spawning, at the second electronic device, a seventh virtual machine that virtualizes network capabilities of the second electronic device such that a seventh virtual network connection is provided;
(k) spawning, at the third electronic device, an eighth virtual machine that virtualizes network capabilities of the third electronic device such that an eighth virtual network connection is provided;
(l) spawning, at the fourth electronic device, a ninth virtual machine that virtualizes network capabilities of the fourth electronic device such that a ninth virtual network connection is provided;
(m) commencing, by the second electronic device utilizing the seventh virtual machine, a network attack using the networking information received via the fourth virtual machine by communicating packets over the seventh virtual network connection;
(n) commencing, by the third electronic device utilizing the eighth virtual machine, the network attack using the networking information received via the fifth virtual machine by communicating packets over the eighth virtual network connection;
(o) commencing, by the third electronic device utilizing the ninth virtual machine, the network attack using the networking information received via the sixth virtual machine by communicating packets over the ninth virtual network connection;
(p) communicating, from the first electronic device to the second electronic device via virtual network connections of the first and second electronic devices, instructions to modify the commenced network attack;
(q) communicating, from the first electronic device to the third electronic device via virtual network connections of the first and third electronic devices, instructions to modify the commenced network attack;
(r) communicating, from the first electronic device to the fourth electronic device via virtual network connections of the first and fourth electronic devices, instructions to modify the commenced network attack; and
(s) adapting, by the second, third and fourth electronic devices in response to the received instructions to modify the network attack, operations forming part of the commenced network attack.
7 Assignments
0 Petitions
Accused Products
Abstract
An unmanned aerial system includes: a plurality of unmanned aerial vehicles, each unmanned aerial vehicle comprising, or having secured thereto, electronic components having software loaded thereon configured to spawn a virtual machine that virtualizes network capabilities of the electronic components; and an electronic device having software loaded thereon configured to spawn a virtual machine that virtualizes network capabilities of the respective electronic device. Each of the plurality of unmanned aerial vehicles is configured for air-to-air electronic communications over a connection with other of the unmanned aerial vehicles, the connection being associated with a virtual machine spawned at the electronic components associated with that respective unmanned aerial vehicle that virtualizes network capabilities of the electronic components. Each of the plurality of unmanned aerial vehicles is configured for air-to-ground communications over a connection with the electronic device, the connection being associated with a virtual machine spawned at the electronic components associated with that respective unmanned aerial vehicle that virtualizes network capabilities of the electronic components. A method for IP jamming utilizing a plurality of electronic devices each having software loaded thereon configured to spawn a virtual machine that virtualizes network capabilities of that respective electronic device, the method includes: communicating from a first electronic device, utilizing virtual dispersive routing, networking information for a network attack to a plurality of other electronic devices; commencing, by the plurality of other electronic devices, a network attack using received networking information; communicating, to each of the plurality of other electronic devices, instructions to modify the network attack; and adapting, in response to received instructions to modify the network attack, by one or more of the plurality of other electronic devices, operations forming part of the commenced network attack.
141 Citations
20 Claims
-
1. A method for IP jamming utilizing a plurality of electronic devices each having software loaded thereon configured to spawn a virtual machine that virtualizes network capabilities of that respective electronic device, the method comprising:
-
(a) spawning, at a first electronic device, a first virtual machine that virtualizes network capabilities of the first electronic device such that a first virtual network connection is provided; (b) spawning, at a first electronic device, a second virtual machine that virtualizes network capabilities of the first electronic device such that a second virtual network connection is provided; (c) spawning, at a first electronic device, a third virtual machine that virtualizes network capabilities of the first electronic device such that a third virtual network connection is provided; (d) spawning, at a second electronic device, a fourth virtual machine that virtualizes network capabilities of the second electronic device such that a fourth virtual network connection is provided; (e) spawning, at a third electronic device, a fifth virtual machine that virtualizes network capabilities of the third electronic device such that a fifth virtual network connection is provided; (f) spawning, at a fourth electronic device, a sixth virtual machine that virtualizes network capabilities of the fourth electronic device such that a sixth virtual network connection is provided; (g) communicating, from the first electronic device utilizing the first virtual machine spawned at the first electronic device, networking information for a network attack to the second electronic device via the fourth virtual machine; (h) communicating, from the first electronic device utilizing the second virtual machine spawned at the first electronic device, networking information for a network attack to the third electronic device via the fifth virtual machine; (i) communicating, from the first electronic device utilizing the third virtual machine spawned at the first electronic device, networking information for a network attack to the fourth electronic device via the sixth virtual machine; (j) spawning, at the second electronic device, a seventh virtual machine that virtualizes network capabilities of the second electronic device such that a seventh virtual network connection is provided; (k) spawning, at the third electronic device, an eighth virtual machine that virtualizes network capabilities of the third electronic device such that an eighth virtual network connection is provided; (l) spawning, at the fourth electronic device, a ninth virtual machine that virtualizes network capabilities of the fourth electronic device such that a ninth virtual network connection is provided; (m) commencing, by the second electronic device utilizing the seventh virtual machine, a network attack using the networking information received via the fourth virtual machine by communicating packets over the seventh virtual network connection; (n) commencing, by the third electronic device utilizing the eighth virtual machine, the network attack using the networking information received via the fifth virtual machine by communicating packets over the eighth virtual network connection; (o) commencing, by the third electronic device utilizing the ninth virtual machine, the network attack using the networking information received via the sixth virtual machine by communicating packets over the ninth virtual network connection; (p) communicating, from the first electronic device to the second electronic device via virtual network connections of the first and second electronic devices, instructions to modify the commenced network attack; (q) communicating, from the first electronic device to the third electronic device via virtual network connections of the first and third electronic devices, instructions to modify the commenced network attack; (r) communicating, from the first electronic device to the fourth electronic device via virtual network connections of the first and fourth electronic devices, instructions to modify the commenced network attack; and (s) adapting, by the second, third and fourth electronic devices in response to the received instructions to modify the network attack, operations forming part of the commenced network attack. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for IP jamming utilizing a plurality of electronic devices each having software loaded thereon configured to spawn a virtual machine that virtualizes network capabilities of that respective electronic device, the method comprising:
-
(a) spawning, at a first electronic device, a first virtual machine that virtualizes network capabilities of the first electronic device such that a first virtual network connection is provided; (b) spawning, at a first electronic device, a second virtual machine that virtualizes network capabilities of the first electronic device such that a second virtual network connection is provided; (c) spawning, at a first electronic device, a third virtual machine that virtualizes network capabilities of the first electronic device such that a third virtual network connection is provided; (d) spawning, at a second electronic device, a fourth virtual machine that virtualizes network capabilities of the second electronic device such that a fourth virtual network connection is provided; (e) spawning, at a third electronic device, a fifth virtual machine that virtualizes network capabilities of the third electronic device such that a fifth virtual network connection is provided; (f) spawning, at a fourth electronic device, a sixth virtual machine that virtualizes network capabilities of the fourth electronic device such that a sixth virtual network connection is provided; (g) communicating, from the first electronic device utilizing the first virtual machine spawned at the first electronic device, networking information for a network attack to the second electronic device via the fourth virtual machine; (h) communicating, from the first electronic device utilizing the second virtual machine spawned at the first electronic device, networking information for a network attack to the third electronic device via the fifth virtual machine; (i) communicating, from the first electronic device utilizing the third virtual machine spawned at the first electronic device, networking information for a network attack to the fourth electronic device via the sixth virtual machine; (j) spawning, at the second electronic device, a seventh virtual machine that virtualizes network capabilities of the second electronic device such that a seventh virtual network connection is provided; (k) spawning, at the third electronic device, an eighth virtual machine that virtualizes network capabilities of the third electronic device such that an eighth virtual network connection is provided; (l) spawning, at the fourth electronic device, a ninth virtual machine that virtualizes network capabilities of the fourth electronic device such that a ninth virtual network connection is provided; (m) commencing, by the second electronic device utilizing the seventh virtual machine, a network attack using the networking information received via the fourth virtual machine by communicating packets over the seventh virtual network connection; (n) commencing, by the third electronic device utilizing the eighth virtual machine, the network attack using the networking information received via the fifth virtual machine by communicating packets over the eighth virtual network connection; and (o) commencing, by the third electronic device utilizing the ninth virtual machine, the network attack using the networking information received via the sixth virtual machine by communicating packets over the ninth virtual network connection. - View Dependent Claims (13, 14, 15, 16, 20)
-
-
17. A method for IP jamming utilizing a plurality of electronic devices each having software loaded thereon configured to spawn a virtual machine that virtualizes network capabilities of that respective electronic device, the method comprising:
-
(a) spawning, at a first electronic device, a plurality of virtual machines that each virtualizes network capabilities of the first electronic device such that a plurality of virtual network connections are provided; (b) communicating, from the first electronic device utilizing the plurality of virtual machines spawned at the first electronic device, networking information for a network attack to a plurality of other electronic devices; (c) spawning, at each respective electronic device of the plurality of other electronic devices, a respective set of one or more virtual machines that each virtualizes network capabilities of that respective electronic device such that a respective set of one or more virtual network connections are provided; (d) commencing, by each of the plurality of other electronic devices utilizing the respective set of one or more virtual machines spawned at that respective electronic device, a network attack using received networking information by communicating packets over the respective set of one or more virtual network connections for that respective electronic device; (c) communicating, from the first electronic device to each of the plurality of other electronic devices via one or more virtual network connections of the first electronic device, instructions to modify the network attack; and (d) adapting, in response to instructions to modify the network attack received at one or more of the plurality of other electronic devices via one or more virtual network connections of each of the one or more of the plurality of other electronic devices, by the one or more of the plurality of other electronic devices, operations forming part of the commenced network attack. - View Dependent Claims (18, 19)
-
Specification