The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 27, 2018

Filed:

Oct. 02, 2017
Applicant:

Illusive Networks Ltd., Tel Aviv, IL;

Inventors:

Shlomo Touboul, Kfar Chaim, IL;

Hanan Levin, Tel Aviv, IL;

Stephane Roubach, Herzliya, IL;

Assaf Mischari, Petach Tikva, IL;

Itai Ben David, Tel Aviv, IL;

Itay Avraham, Tel Aviv, IL;

Adi Ozer, Shoham, IL;

Chen Kazaz, Tel Aviv, IL;

Ofer Israeli, Tel Aviv, IL;

Olga Vingurt, Shderot, IL;

Liad Gareh, Herzliya, IL;

Israel Grimberg, Ra'anana, IL;

Cobby Cohen, Tel Aviv, IL;

Sharon Sultan, Tel Aviv, IL;

Matan Kubovsky, Tel Aviv, IL;

Assignee:

ILLUSIVE NETWORKS LTD., Tel Aviv, IL;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 21/57 (2013.01); G06F 21/56 (2013.01); G06F 21/55 (2013.01); G06N 99/00 (2010.01);
U.S. Cl.
CPC ...
H04L 63/1491 (2013.01); G06F 21/55 (2013.01); G06F 21/554 (2013.01); G06F 21/56 (2013.01); G06F 21/577 (2013.01); G06N 99/005 (2013.01); H04L 63/102 (2013.01); H04L 63/1416 (2013.01); H04L 63/1425 (2013.01); H04L 63/1441 (2013.01); H04L 63/20 (2013.01); H04L 29/06904 (2013.01); H04L 63/10 (2013.01); H04L 63/1433 (2013.01); H04L 2463/146 (2013.01);
Abstract

A system for network surveillance to detect attackers, including a deception management server within a network of resources, including a deployment module managing and planting one or more decoy attack vectors in one or more of the resources in the network, wherein an attack vector is an object in memory or storage of a first resource that may be used to access a second resource, and one or more decoy servers accessible from resources in the network, each decoy server including an alert module that issues an alert when a specific resource in the network accesses the decoy server via one or more of the decoy attack vectors planted in the specific resource by the deployment module, and a delay module, delaying access to data on the decoy server while a resource accesses the decoy server.


Find Patent Forward Citations

Loading…