发明名称 MANAGING DYNAMIC DECEPTIVE ENVIRONMENTS
摘要 A deception management system to detect attackers within a dynamically changing network, including a deployment governor dynamically designating a deception policy that includes one or more decoy attack vectors, one or more resources of the network in which the decoy attack vectors are generated, and a schedule for generating the decoy attack vectors in the resources, wherein an attack vector is an object in a first resource that may be used by an attacker to access or discover a second resource, and wherein the network of resources is dynamically changing, a deception deployer dynamically generating decoy attack vectors on resources in the network, in accordance with the current deception policy, a deception adaptor dynamically extracting characteristics of the network, and a deception diversifier dynamically triggering changes in the deception policy based on changes in the network as detected from the network characteristics extracted by the deception adaptor.
申请公布号 US2016359882(A1) 申请公布日期 2016.12.08
申请号 US201615175048 申请日期 2016.06.07
申请人 Illusive Networks Ltd. 发明人 Touboul Shlomo;Levin Hanan;Roubach Stephane;Mischari Assaf;Ben David Itai;Avraham Itay;Ozer Adi;Kazaz Chen;Israeli Ofer;Vingurt Olga;Gareh Liad;Grimberg Israel;Cohen Cobby;Sultan Sharon;Kubovsky Matan
分类号 H04L29/06 主分类号 H04L29/06
代理机构 代理人
主权项 1. A deception management system (DMS) to detect attackers within a dynamically changing network of resources, comprising: a deployment governor dynamically designating a deception policy that comprises one or more decoy attack vectors, one or more resources of a network in which the one or more decoy attack vectors are generated, and a schedule for generating the one or more decoy attack vectors in the one or more resources, wherein an attack vector is an object in a first resource that may be used by an attacker to access or discover a second resource, and wherein the network of resources is dynamically changing; a deception deployer dynamically generating one or more decoy attack vectors in one or more resources in the network, in accordance with the current deception policy; a deception adaptor dynamically extracting characteristics of the network; and a deception diversifier dynamically triggering changes in the deception policy based on changes in the network as detected from the network characteristics extracted by said deception adaptor.
地址 Tel Aviv IL