The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jul. 24, 2018

Filed:

Apr. 25, 2017
Applicant:

Acalvio Technologies, Inc., Cupertino, CA (US);

Inventors:

Johnson Wu, Santa Clara, CA (US);

Rajendra A. Gopalakrishna, Bangalore, IN;

Sreenivas Gukal, Santa Clara, CA (US);

Rammohan Varadarajan, Cupertino, CA (US);

Assignee:

ACALVIO TECHNOLOGIES, INC., Cupertino, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 12/24 (2006.01);
U.S. Cl.
CPC ...
H04L 63/1491 (2013.01); H04L 41/0886 (2013.01); H04L 63/1425 (2013.01); H04L 63/1433 (2013.01); H04L 41/0816 (2013.01); H04L 63/1408 (2013.01);
Abstract

Provided are methods, network devices, and computer-program products for a network deception system. The network deception system can engage a network threat with a deception mechanism, and dynamically escalating the deception to maintain the engagement. The system can include super-low, low, and high-interaction deceptions. The super-low deceptions can respond to requests for address information, and requires few computing resources. When network traffic directed to the super-low deception requires a more complex response, the system can initiate a low-interaction deception. The low-interaction deception can emulate multiple devices, which can give the low-interaction deception away as a deception. Hence, when the network traffic includes an attempted connection, the system can initiate a high-interaction deception. The high-interaction more closely emulates a network device, and can be more difficult to identify as a deception. The high-interaction deception can fully engage a network threat, and can be initiated only as needed.


Find Patent Forward Citations

Loading…