The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 14, 2019

Filed:

Jul. 05, 2017
Applicant:

Illusive Networks Ltd., Tel Aviv, IL;

Inventors:

Shlomo Touboul, Kfar Chaim, IL;

Hanan Levin, Tel Aviv, IL;

Stephane Roubach, Herzliya, IL;

Assaf Mischari, Petach Tikva, IL;

Itai Ben David, Tel Aviv, IL;

Itay Avraham, Tel Aviv, IL;

Adi Ozer, Shoham, IL;

Chen Kazaz, Tel Aviv, IL;

Ofer Israeli, Tel Aviv, IL;

Olga Vingurt, Shderot, IL;

Liad Gareh, Herzliya, IL;

Israel Grimberg, Ra'anana, IL;

Cobby Cohen, Tel Aviv, IL;

Sharon Sultan, Tel Aviv, IL;

Matan Kubovsky, Tel Aviv, IL;

Assignee:

ILLUSIVE NETWORKS LTD., Tel Aviv, IL;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 21/57 (2013.01); G06F 21/56 (2013.01); G06F 21/55 (2013.01); G06N 99/00 (2019.01);
U.S. Cl.
CPC ...
H04L 63/1491 (2013.01); G06F 21/55 (2013.01); G06F 21/554 (2013.01); G06F 21/56 (2013.01); G06F 21/577 (2013.01); G06N 99/005 (2013.01); H04L 63/102 (2013.01); H04L 63/1416 (2013.01); H04L 63/1425 (2013.01); H04L 63/1441 (2013.01); H04L 63/20 (2013.01); H04L 29/06904 (2013.01); H04L 63/10 (2013.01); H04L 63/1433 (2013.01); H04L 2463/146 (2013.01);
Abstract

A cyber security system comprising circuitry of a decoy deployer planting one or more decoy lateral attack vectors in each of a first and a second group of resources within a common enterprise network of resources, the first and second groups of resources having different characteristics in terms of subnets, naming conventions, DNS aliases, listening ports, users and their privileges, and installed applications, wherein a lateral attack vector is an object of a first resource within the network that has a potential to be used by an attacker who discovered the first resource to further discover information regarding a second resource within the network, the second resource being previously undiscovered by the attacker, and wherein the decoy lateral attack vectors in the first group conform to the characteristics of the first group, and the decoy lateral attack vectors in the second group conform to the characteristics of the second group.


Find Patent Forward Citations

Loading…