发明名称 |
Use of decoy data in a data store |
摘要 |
Disclosed are various embodiments for identifying a table of non-decoy data matching a set of criteria. Decoy data is inserted into the table of non-decoy data. The decoy data is detected in a result comprising the decoy data, the result generated in response to an access of the data store. An alarm is generated based at least upon the result. |
申请公布号 |
US9361457(B1) |
申请公布日期 |
2016.06.07 |
申请号 |
US201514616143 |
申请日期 |
2015.02.06 |
申请人 |
Amazon Technologies, Inc. |
发明人 |
Ramalingam Harsha;Bollefer Timothy Mark Edward;Brezinkski Dominique I.;Johansson Jesper M.;Petts James C. |
分类号 |
G06F21/00;H04L29/06;G06F21/56;G06F17/30;H04L12/66;G06F13/00 |
主分类号 |
G06F21/00 |
代理机构 |
Thomas | Horstemeyer, LLP |
代理人 |
Thomas | Horstemeyer, LLP |
主权项 |
1. A non-transitory computer-readable medium embodying a program executable in a network device, the program, when executed, causing the at least one computing device to at least:
obtain signature data indicating decoy data as a column of data appended to a plurality of non-decoy data; detect the decoy data among the plurality of non-decoy data by determining whether the column of data is included in a response to an access of a data store, the response being communicated via the network device; perform, responsive to the column of data being included in the response, an action based at least in part on a position of the network device in a network; and wherein the action comprises at least one of generating an alarm, quarantining at least a portion of the response, or logging a detection of the decoy data. |
地址 |
Seattle WA US |