The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 15, 2024

Filed:

May. 27, 2020
Applicant:

Crowdstrike, Inc., Sunnyvale, CA (US);

Inventors:

Adam S. Meyers, Washington, DC (US);

Dmitri Alperovitch, Gaithersburg, MD (US);

George Robert Kurtz, Ladera Ranch, CA (US);

David F. Diehl, Minneapolis, MN (US);

Sven Krasser, Los Angeles, CA (US);

Assignee:

CrowdStrike, Inc., Sunnyvale, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/55 (2013.01); G06F 21/56 (2013.01); G06F 21/62 (2013.01); H04L 9/40 (2022.01); H04L 61/4511 (2022.01);
U.S. Cl.
CPC ...
G06F 21/56 (2013.01); G06F 21/554 (2013.01); G06F 21/6209 (2013.01); H04L 61/4511 (2022.05); H04L 63/1491 (2013.01); G06F 2221/2111 (2013.01); G06F 2221/2129 (2013.01);
Abstract

Deception-based techniques for responding to security attacks are described herein. The techniques include transitioning a security attack to a monitored computing device posing as a computing device impacted by the security attack and enabling the adversary to obtain deceptive information from the monitored computing device. Also, the adversary may obtain a document configured to report identifying information of an entity opening the document, thereby identifying the adversary associated with the attack. Further, the techniques include determining that a domain specified in a domain name request is associated with malicious activity and responding to the request with a network address of a monitored computing device to cause the requesting process to communicate with the monitored computing device in place of an adversary server. Additionally, a service may monitor dormant domains names associated with malicious activity and, in response to a change, respond with an alert or a configuration update.


Find Patent Forward Citations

Loading…