Movatterモバイル変換


[0]ホーム

URL:


US20220329627A1 - Tunneling for network deceptions - Google Patents

Tunneling for network deceptions
Download PDF

Info

Publication number
US20220329627A1
US20220329627A1US17/535,467US202117535467AUS2022329627A1US 20220329627 A1US20220329627 A1US 20220329627A1US 202117535467 AUS202117535467 AUS 202117535467AUS 2022329627 A1US2022329627 A1US 2022329627A1
Authority
US
United States
Prior art keywords
network
deception
devices
security
site
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/535,467
Inventor
Johnson Wu
Sreenivas Gukal
Rammohan Varadarajan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Acalvio Technologies Inc
Original Assignee
Acalvio Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Acalvio Technologies IncfiledCriticalAcalvio Technologies Inc
Priority to US17/535,467priorityCriticalpatent/US20220329627A1/en
Assigned to ACALVIO TECHNOLOGIES, INC.reassignmentACALVIO TECHNOLOGIES, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: WU, JOHNSON, VARADARAJAN, RAMMOHAN, GUKAL, SREENIVAS
Publication of US20220329627A1publicationCriticalpatent/US20220329627A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Provided are systems, methods, and computer-program products for providing network deceptions using a network tunnel. In various implementations, a network device on a first network can be configured as a projection point. A projection point can be configured as one endpoint of a network tunnel. The other end of the network tunnel can terminate at a deception farm. The deception farm can host a second network, where the second network includes network devices configured as deception mechanisms. By assigning a deception mechanism a network address from the first network, the network address and the network tunnel enable the deception mechanism to appear as a node in the first network.

Description

Claims (21)

9. A network device comprising:
one or more processors; and
a non-transitory computer-readable medium including instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including:
determining a network address on a first network, wherein:
the network address is determined from available network addresses in the first network; and
the first network is a cloud segment;
configuring a network tunnel to a second network, wherein the second network includes one or more deception mechanisms;
selecting a deception mechanism from among the one or more deception mechanisms; and
assigning the network address to the selected deception mechanism, wherein the network address and the network tunnel enable the selected deception mechanism to be on the first network.
16. A computer-program product tangibly embodied in a non-transitory machine-readable storage medium, including instructions that, when executed by one or more processors, cause the one or more processors to:
determine, by a projection point configured on a network device on a first network, a network address, wherein:
the network address is determined from available network addresses in the first network; and
the first network is a cloud segment;
configure a network tunnel to a second network, wherein the second network includes one or more deception mechanisms;
select a deception mechanism from among the one or more deception mechanisms; and
assign the network address to the selected deception mechanism, wherein the network address and the network tunnel enable the selected deception mechanism to be on the first network.
US17/535,4672016-04-262021-11-24Tunneling for network deceptionsAbandonedUS20220329627A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/535,467US20220329627A1 (en)2016-04-262021-11-24Tunneling for network deceptions

Applications Claiming Priority (6)

Application NumberPriority DateFiling DateTitle
US201662327836P2016-04-262016-04-26
US201662344267P2016-06-012016-06-01
US15/498,300US9979750B2 (en)2016-04-262017-04-26Tunneling for network deceptions
US15/983,418US10616276B2 (en)2016-04-262018-05-18Tunneling for network deceptions
US16/800,763US11212315B2 (en)2016-04-262020-02-25Tunneling for network deceptions
US17/535,467US20220329627A1 (en)2016-04-262021-11-24Tunneling for network deceptions

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US16/800,763ContinuationUS11212315B2 (en)2016-04-262020-02-25Tunneling for network deceptions

Publications (1)

Publication NumberPublication Date
US20220329627A1true US20220329627A1 (en)2022-10-13

Family

ID=58692617

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US15/498,300ActiveUS9979750B2 (en)2016-04-262017-04-26Tunneling for network deceptions
US15/983,418Active2037-05-02US10616276B2 (en)2016-04-262018-05-18Tunneling for network deceptions
US16/800,763ActiveUS11212315B2 (en)2016-04-262020-02-25Tunneling for network deceptions
US17/535,467AbandonedUS20220329627A1 (en)2016-04-262021-11-24Tunneling for network deceptions

Family Applications Before (3)

Application NumberTitlePriority DateFiling Date
US15/498,300ActiveUS9979750B2 (en)2016-04-262017-04-26Tunneling for network deceptions
US15/983,418Active2037-05-02US10616276B2 (en)2016-04-262018-05-18Tunneling for network deceptions
US16/800,763ActiveUS11212315B2 (en)2016-04-262020-02-25Tunneling for network deceptions

Country Status (2)

CountryLink
US (4)US9979750B2 (en)
WO (1)WO2017189765A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20230109224A1 (en)*2020-09-282023-04-06T-Mobile Usa, Inc.Network security system including a multi-dimensional domain name system to protect against cybersecurity threats
US12166801B2 (en)2020-09-282024-12-10T-Mobile Usa, Inc.Digital coupons for security service of communications system

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10326796B1 (en)*2016-04-262019-06-18Acalvio Technologies, Inc.Dynamic security mechanisms for mixed networks
WO2017189765A1 (en)2016-04-262017-11-02Acalvio Technologies, Inc.Tunneling for network deceptions
US10581875B2 (en)2016-05-272020-03-03Afero, Inc.System and method for preventing security breaches in an internet of things (IOT) system
US10419930B2 (en)2016-05-272019-09-17Afero, Inc.System and method for establishing secure communication channels with internet of things (IoT) devices
US10715533B2 (en)*2016-07-262020-07-14Microsoft Technology Licensing, Llc.Remediation for ransomware attacks on cloud drive folders
US10628585B2 (en)2017-01-232020-04-21Microsoft Technology Licensing, LlcRansomware resilient databases
US10986126B2 (en)*2017-07-252021-04-20Palo Alto Networks, Inc.Intelligent-interaction honeypot for IoT devices
EP3506615B1 (en)*2017-12-292021-02-03InContact, Inc.Contact centre system and method for establishing a communication session with sensor equipped devices in a contact center network
US10831914B2 (en)*2018-03-262020-11-10Bank Of America CorporationSecure extensible wireless communication with IoT devices
US11096243B2 (en)2018-04-132021-08-17Kwesst Inc.Programmable multi-waveform RF generator for use as battlefield decoy
US10969467B1 (en)2018-04-132021-04-06Kwesst Inc.Programmable multi-waveform RF generator for use as battlefield decoy
US11374971B2 (en)2018-08-242022-06-28Micro Focus LlcDeception server deployment
US11550284B2 (en)*2019-02-042023-01-10Saudi Arabian Oil CompanyDynamic remote terminal unit (RTU) configurator assignment server enabled wastewater evaporation pond management system
US11647000B2 (en)*2019-11-142023-05-09Saudi Arabian Oil CompanySystem and method for protecting a communication device against identification outside a computer network by generating random and normalized non-IoT traffic
US11477221B2 (en)*2019-11-142022-10-18Saudi Arabian Oil CompanySystem and method for protecting a communication device against identification outside a computer network by routing traffic through a smart hub
US11734044B2 (en)*2020-12-312023-08-22Nutanix, Inc.Configuring virtualization system images for a computing cluster
US11611618B2 (en)2020-12-312023-03-21Nutanix, Inc.Orchestrating allocation of shared resources in a datacenter
US11693695B1 (en)*2021-04-122023-07-04Vmware, Inc.Application self-replication control
US11916950B1 (en)2021-04-122024-02-27Vmware, Inc.Coordinating a distributed vulnerability network scan
US11528317B1 (en)2021-05-052022-12-13Vmware, Inc.Proxy-enabled communication across network boundaries by self-replicating applications
US20230164184A1 (en)*2021-11-232023-05-25Zscaler, Inc.Cloud-based deception technology with auto-decoy and breadcrumb creation
US12238132B2 (en)*2022-04-222025-02-25Xerox CorporationMethod and system for facilitating a ranking score using attack volume to find optimal configurations
KR102548703B1 (en)*2022-11-222023-06-28에스지에이솔루션즈 주식회사Providing method, apparatus and computer-readable medium of controlling access to a remote system in a home network environment

Family Cites Families (61)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7240368B1 (en)*1999-04-142007-07-03Verizon Corporate Services Group Inc.Intrusion and misuse deterrence system employing a virtual network
US7107347B1 (en)1999-11-152006-09-12Fred CohenMethod and apparatus for network deception/emulation
US6883031B1 (en)2000-09-142005-04-19Lucent Technologies Inc.RUSH-DCS—an adaptable high performance interface for services
US20020157020A1 (en)2001-04-202002-10-24Coby RoyerFirewall for protecting electronic commerce databases from malicious hackers
US20040078592A1 (en)*2002-10-162004-04-22At & T Corp.System and method for deploying honeypot systems in a network
US9503470B2 (en)2002-12-242016-11-22Fred Herz Patents, LLCDistributed agent based model for security monitoring and response
US20050166072A1 (en)2002-12-312005-07-28Converse Vikki K.Method and system for wireless morphing honeypot
US7412723B2 (en)2002-12-312008-08-12International Business Machines CorporationMethod and system for morphing honeypot with computer security incident correlation
US8713306B1 (en)*2003-10-142014-04-29Symantec CorporationNetwork decoys
US20050108415A1 (en)2003-11-042005-05-19Turk Doughan A.System and method for traffic analysis
US7725937B1 (en)2004-02-092010-05-25Symantec CorporationCapturing a security breach
US8584239B2 (en)2004-04-012013-11-12Fireeye, Inc.Virtual machine with dynamic data flow analysis
US7657735B2 (en)*2004-08-192010-02-02At&T CorpSystem and method for monitoring network traffic
KR100609710B1 (en)2004-11-252006-08-08한국전자통신연구원 Network simulation device and method for abnormal traffic analysis
US7665134B1 (en)2005-01-262010-02-16Symantec CorporationProfiling users based on artificially constructed deceptive content
US20080098476A1 (en)2005-04-042008-04-24Bae Systems Information And Electronic Systems Integration Inc.Method and Apparatus for Defending Against Zero-Day Worm-Based Attacks
US8171544B2 (en)2005-04-202012-05-01Cisco Technology, Inc.Method and system for preventing, auditing and trending unauthorized traffic in network systems
IL177429A0 (en)2006-08-102007-07-04Univ Ben GurionA system that provides early detection. alert, and response to electronic threats
DE102007001831A1 (en)*2006-09-142008-03-27Rohde & Schwarz Gmbh & Co. KgEncrypted communications links addressing and routing method, involves providing interface in encryption device with unique assignment of addresses of routing layer to addresses of another routing layer
US20120084866A1 (en)2007-06-122012-04-05Stolfo Salvatore JMethods, systems, and media for measuring computer security
US20090235359A1 (en)*2008-03-122009-09-17Comodo Ca LimitedMethod and system for performing security and vulnerability scans on devices behind a network security device
US8170037B2 (en)*2008-05-212012-05-01Polcha Andrew JDevices and methods for a virtual internet protocol television (VIPTV)
US20090319247A1 (en)2008-06-182009-12-24Eads Na Defense Security And Systems Solutions IncSystems and Methods for A Simulated Network Environment and Operation Thereof
US8769684B2 (en)2008-12-022014-07-01The Trustees Of Columbia University In The City Of New YorkMethods, systems, and media for masquerade attack detection by monitoring computer user behavior
US8019837B2 (en)*2009-01-142011-09-13International Business Machines CorporationProviding network identity for virtual machines
US8844041B1 (en)*2010-01-122014-09-23Symantec CorporationDetecting network devices and mapping topology using network introspection by collaborating endpoints
JP5549803B2 (en)2010-03-032014-07-16セイコーエプソン株式会社 Recording device
JP2014506045A (en)2010-12-152014-03-06ザンッツ インク Network stimulation engine
CN102254120B (en)2011-08-092014-05-21华为数字技术(成都)有限公司Method, system and relevant device for detecting malicious codes
US8739281B2 (en)2011-12-062014-05-27At&T Intellectual Property I, L.P.Multilayered deception for intrusion detection and prevention
US9356942B1 (en)2012-03-052016-05-31Neustar, Inc.Method and system for detecting network compromise
US9485276B2 (en)2012-09-282016-11-01Juniper Networks, Inc.Dynamic service handling using a honeypot
US20140096229A1 (en)*2012-09-282014-04-03Juniper Networks, Inc.Virtual honeypot
US9021092B2 (en)2012-10-192015-04-28Shadow Networks, Inc.Network infrastructure obfuscation
US20150047032A1 (en)2013-08-072015-02-12Front Porch Communications, Inc.System and method for computer security
US9621568B2 (en)*2014-02-112017-04-11Varmour Networks, Inc.Systems and methods for distributed threat detection in a computer network
US20170374032A1 (en)2016-06-242017-12-28Varmour Networks, Inc.Autonomic Protection of Critical Network Applications Using Deception Techniques
US20150326592A1 (en)2014-05-072015-11-12Attivo Networks Inc.Emulating shellcode attacks
US9680855B2 (en)2014-06-302017-06-13Neo Prime, LLCProbabilistic model for cyber risk forecasting
US10193924B2 (en)*2014-09-172019-01-29Acalvio Technologies, Inc.Network intrusion diversion using a software defined network
US9477837B1 (en)2015-03-312016-10-25Juniper Networks, Inc.Configuring a sandbox environment for malware testing
US9785776B2 (en)2015-04-272017-10-10Iboss, Inc.High risk program identification based on program behavior
US20170093910A1 (en)*2015-09-252017-03-30Acalvio Technologies, Inc.Dynamic security mechanisms
US10440054B2 (en)*2015-09-252019-10-08Perspecta Labs Inc.Customized information networks for deception and attack mitigation
US20170134405A1 (en)2015-11-092017-05-11Qualcomm IncorporatedDynamic Honeypot System
WO2017087964A1 (en)2015-11-202017-05-26Acalvio Technologies, Inc.Modification of a server to mimic a deception mechanism
US10097581B1 (en)2015-12-282018-10-09Amazon Technologies, Inc.Honeypot computing services that include simulated computing resources
US20170214708A1 (en)2016-01-252017-07-27Acalvio Technologies, Inc.Detecting security threats by combining deception mechanisms and data science
WO2017131963A1 (en)2016-01-292017-08-03Acalvio Technologies, Inc.Using high-interaction networks for targeted threat intelligence
US10560434B2 (en)2016-02-102020-02-11Level 3 Communications, LlcAutomated honeypot provisioning system
GB201603118D0 (en)2016-02-232016-04-06Eitc Holdings LtdReactive and pre-emptive security system based on choice theory
WO2017156261A1 (en)2016-03-102017-09-14Acalvio Technologies, Inc.Active deception system
US9961099B2 (en)2016-04-182018-05-01Acalvio Technologies, Inc.Systems and methods for detecting and tracking adversary trajectory
WO2017189765A1 (en)2016-04-262017-11-02Acalvio Technologies, Inc.Tunneling for network deceptions
US10326796B1 (en)2016-04-262019-06-18Acalvio Technologies, Inc.Dynamic security mechanisms for mixed networks
WO2017189587A1 (en)2016-04-262017-11-02Acalvio Technologies, Inc.Threat engagement and deception escalation
WO2017189071A1 (en)2016-04-272017-11-02Acalvio Technologies, Inc.Context-aware knowledge system and methods for deploying deception mechanisms
US10462181B2 (en)2016-05-102019-10-29Quadrant Information SecurityMethod, system, and apparatus to identify and study advanced threat tactics, techniques and procedures
US10375110B2 (en)*2016-05-122019-08-06Attivo Networks Inc.Luring attackers towards deception servers
US9985988B2 (en)2016-06-012018-05-29Acalvio Technologies, Inc.Deception to detect network scans
US9756075B1 (en)2016-11-222017-09-05Acalvio Technologies, Inc.Dynamic hiding of deception mechanism

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20230109224A1 (en)*2020-09-282023-04-06T-Mobile Usa, Inc.Network security system including a multi-dimensional domain name system to protect against cybersecurity threats
US12074899B2 (en)*2020-09-282024-08-27T-Mobile Usa, Inc.Network security system including a multi-dimensional domain name system to protect against cybersecurity threats
US12166801B2 (en)2020-09-282024-12-10T-Mobile Usa, Inc.Digital coupons for security service of communications system

Also Published As

Publication numberPublication date
US10616276B2 (en)2020-04-07
US20210021640A1 (en)2021-01-21
US11212315B2 (en)2021-12-28
US9979750B2 (en)2018-05-22
US20170310706A1 (en)2017-10-26
US20180351996A1 (en)2018-12-06
WO2017189765A1 (en)2017-11-02

Similar Documents

PublicationPublication DateTitle
US11212315B2 (en)Tunneling for network deceptions
US10326796B1 (en)Dynamic security mechanisms for mixed networks
US9985988B2 (en)Deception to detect network scans
US9961099B2 (en)Systems and methods for detecting and tracking adversary trajectory
US10972503B1 (en)Deception mechanisms in containerized environments
US9853999B2 (en)Context-aware knowledge system and methods for deploying deception mechanisms
US10033762B2 (en)Threat engagement and deception escalation
US9836512B1 (en)Systems and methods for identifying similar hosts
US10104120B2 (en)Command and control cyber vaccine
US20170264639A1 (en)Active deception system
US20170149825A1 (en)Modification of a Server to Mimic a Deception Mechanism
US9756075B1 (en)Dynamic hiding of deception mechanism
US20170214708A1 (en)Detecting security threats by combining deception mechanisms and data science
US10362057B1 (en)Enterprise DNS analysis
US20170093910A1 (en)Dynamic security mechanisms
US20170289191A1 (en)Infiltration Detection and Network Rerouting
US20170223037A1 (en)Using high-interaction networks for targeted threat intelligence
Wendzel et al.Cyber security of smart buildings

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:ACALVIO TECHNOLOGIES, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WU, JOHNSON;GUKAL, SREENIVAS;VARADARAJAN, RAMMOHAN;SIGNING DATES FROM 20170425 TO 20200225;REEL/FRAME:058209/0717

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp