The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 10, 2017

Filed:

Jan. 11, 2017
Applicant:

Illusive Networks Ltd., Tel Aviv, IL;

Inventors:

Shlomo Touboul, Kfar Chaim, IL;

Hanan Levin, Tel Aviv, IL;

Stephane Roubach, Herzliya, IL;

Assaf Mischari, Petach Tikva, IL;

Itai Ben David, Tel Aviv, IL;

Itay Avraham, Tel Aviv, IL;

Adi Ozer, Shoham, IL;

Chen Kazaz, Tel Aviv, IL;

Ofer Israeli, Tel Aviv, IL;

Olga Vingurt, Shderot, IL;

Liad Gareh, Herzliya, IL;

Israel Grimberg, Ra'anana, IL;

Cobby Cohen, Tel Aviv, IL;

Sharon Sultan, Tel Aviv, IL;

Matan Kubovsky, Tel Aviv, IL;

Assignee:

IILUSVE NETWORKS LTD., Tel Aviv, IL;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
H04L 63/1491 (2013.01);
Abstract

A system for augmenting an attacker map of a network of resources, including a deception management server within a network of resources, generating an attacker map for the network, the attacker map including one or more attack paths traversing some or all of the resources, each attack path corresponding to one or more successive attack vectors, wherein an attack vector is an object in memory or storage of a first resource of the network that may potentially lead an attacker to a second resource of the network, and a deployment module for planting one or more decoy attack vectors in some of all of the resources of the network, wherein the deception management server generates an augmented attacker map by augmenting the attack paths based on the decoy attack vectors added by the deployment module.


Find Patent Forward Citations

Loading…