The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 12, 2019

Filed:

Jan. 12, 2017
Applicant:

Acalvio Technologies, Inc., Cupertino, CA (US);

Inventors:

Abhishek Singh, Morgan Hill, CA (US);

Sreenivas Gukal, Santa Clara, CA (US);

Assignee:

ACALVIO TECHNOLOGIES, INC., Cupertino, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/00 (2006.01); H04L 29/06 (2006.01); H04L 12/26 (2006.01); H04L 12/58 (2006.01); H04L 12/24 (2006.01); G06F 21/53 (2013.01); G06F 21/56 (2013.01);
U.S. Cl.
CPC ...
H04L 63/1416 (2013.01); H04L 43/062 (2013.01); H04L 51/12 (2013.01); H04L 63/1425 (2013.01); H04L 63/1433 (2013.01); H04L 63/1441 (2013.01); H04L 63/1491 (2013.01); G06F 21/53 (2013.01); G06F 21/564 (2013.01); H04L 41/0816 (2013.01); H04L 41/0886 (2013.01); H04L 63/1408 (2013.01);
Abstract

Provided are methods, network devices, and computer-program products for targeted threat intelligence using a high-interaction network. In some implementations, a network device in a network may receive suspect network traffic. The suspect network traffic may include network traffic identified as potentially causing harm to the network. The network device may determine that the suspect traffic is associated with an unknown threat. The network device may further analyze the suspect network traffic using a high-interaction network. In various implementations, the high-interaction network may be configured to emulate at least a part of the network. In various implementations, analyzing the suspect network traffic may include determining a behavior of the suspect network traffic in the high-interaction network. The network device may further generate indicators, where the indicators may describe the suspect network traffic. In various implementations, the indicators facilitate analysis of a network's susceptibility to the unknown threat.


Find Patent Forward Citations

Loading…