发明名称 |
MANAGING DYNAMIC DECEPTIVE ENVIRONMENTS |
摘要 |
A deception management system to detect attackers within a dynamically changing network, including a deployment governor dynamically designating a deception policy that includes one or more decoy attack vectors, one or more resources of the network in which the decoy attack vectors are generated, and a schedule for generating the decoy attack vectors in the resources, wherein an attack vector is an object in a first resource that may be used by an attacker to access or discover a second resource, and wherein the network of resources is dynamically changing, a deception deployer dynamically generating decoy attack vectors on resources in the network, in accordance with the current deception policy, a deception adaptor dynamically extracting characteristics of the network, and a deception diversifier dynamically triggering changes in the deception policy based on changes in the network as detected from the network characteristics extracted by the deception adaptor. |
申请公布号 |
US2016359882(A1) |
申请公布日期 |
2016.12.08 |
申请号 |
US201615175048 |
申请日期 |
2016.06.07 |
申请人 |
Illusive Networks Ltd. |
发明人 |
Touboul Shlomo;Levin Hanan;Roubach Stephane;Mischari Assaf;Ben David Itai;Avraham Itay;Ozer Adi;Kazaz Chen;Israeli Ofer;Vingurt Olga;Gareh Liad;Grimberg Israel;Cohen Cobby;Sultan Sharon;Kubovsky Matan |
分类号 |
H04L29/06 |
主分类号 |
H04L29/06 |
代理机构 |
|
代理人 |
|
主权项 |
1. A deception management system (DMS) to detect attackers within a dynamically changing network of resources, comprising:
a deployment governor dynamically designating a deception policy that comprises one or more decoy attack vectors, one or more resources of a network in which the one or more decoy attack vectors are generated, and a schedule for generating the one or more decoy attack vectors in the one or more resources, wherein an attack vector is an object in a first resource that may be used by an attacker to access or discover a second resource, and wherein the network of resources is dynamically changing; a deception deployer dynamically generating one or more decoy attack vectors in one or more resources in the network, in accordance with the current deception policy; a deception adaptor dynamically extracting characteristics of the network; and a deception diversifier dynamically triggering changes in the deception policy based on changes in the network as detected from the network characteristics extracted by said deception adaptor. |
地址 |
Tel Aviv IL |