发明名称 Deception-Based Responses to Security Attacks
摘要 Deception-based techniques for responding to security attacks are described herein. The techniques include transitioning a security attack to a monitored computing device posing as a computing device impacted by the security attack and enabling the adversary to obtain deceptive information from the monitored computing device. Also, the adversary may obtain a document configured to report identifying information of an entity opening the document, thereby identifying the adversary associated with the attack. Further, the techniques include determining that a domain specified in a domain name request is associated with malicious activity and responding to the request with a network address of a monitored computing device to cause the requesting process to communicate with the monitored computing device in place of an adversary server. Additionally, a service may monitor dormant domains names associated with malicious activity and, in response to a change, respond with an alert or a configuration update.
申请公布号 US2014250524(A1) 申请公布日期 2014.09.04
申请号 US201313784720 申请日期 2013.03.04
申请人 CROWDSTRIKE, INC. 发明人 Meyers Adam S.;Alperovitch Dmitri;Kurtz George Robert;Diehl David F.;Krasser Sven
分类号 G06F21/56 主分类号 G06F21/56
代理机构 代理人
主权项 1. A computer-implemented method comprising: receiving automated or manual notification of an attack; transitioning the attack to a monitored computing process or device that is configured to pose to an adversary as a computing device impacted by the attack; and enabling the adversary to obtain deceptive information from the monitored computing process or device.
地址 Laguna Niguel CA US