Deceiving attackers in endpoint systems

Endpoints in a network execute a sensor module that intercepts commands. The sensor module compares a source of commands to a sanctioned list of applications received from a management server. If the source does not match a sanctioned application and the command is a write or delete command, the com...

Full description

Saved in:
Bibliographic Details
Main Authors Porwal, Vinod Kumar A, Lakshmanan, Muthukumar, Ramchetty, Harinath Vishwanath, Vissametty, Venu
Format Patent
LanguageEnglish
Published 24.03.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Endpoints in a network execute a sensor module that intercepts commands. The sensor module compares a source of commands to a sanctioned list of applications received from a management server. If the source does not match a sanctioned application and the command is a write or delete command, the command is ignored and a simulated acknowledgment is sent. If the command is a read command, deception data is returned instead. In some embodiments, certain data is protected such that commands will be ignored or modified to refer to deception data where the source is not a sanctioned application. The source may be verified to be a sanctioned application by evaluating a certificate, hash, or path of the source.
Bibliography:Application Number: US201615383522