×

Managing security breaches in a networked computing environment

  • US 9,462,013 B1
  • Filed: 04/29/2015
  • Issued: 10/04/2016
  • Est. Priority Date: 04/29/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method of managing security breaches in a networked computing environment, comprising:

  • detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment comprises a decoy system interweaved with the production system;

    receiving, by the at least one computer device, a communication after the detecting the breach;

    determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user; and

    based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user;

    wherein the networked computing environment comprises layers, andfurther comprising determining one of the layers at which the breach occurred; and

    wherein;

    the communication is determined to be associated with the malicious user;

    the routing is based on the determined one of the layers;

    wherein the routing comprises;

    permitting the malicious user to access at least one element of the production system in one or more first layers up to and including the determined one of the layers; and

    routing the malicious user to at least one element of the decoy system in one or more second layers downstream of the determined one of the layers.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×