Deceiving attackers in endpoint systems
Endpoints in a network execute a sensor module that intercepts commands. The sensor module compares a source of commands to a sanctioned list of applications received from a management server. If the source does not match a sanctioned application and the command is a write or delete command, the com...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | English |
Published |
24.03.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Endpoints in a network execute a sensor module that intercepts commands. The sensor module compares a source of commands to a sanctioned list of applications received from a management server. If the source does not match a sanctioned application and the command is a write or delete command, the command is ignored and a simulated acknowledgment is sent. If the command is a read command, deception data is returned instead. In some embodiments, certain data is protected such that commands will be ignored or modified to refer to deception data where the source is not a sanctioned application. The source may be verified to be a sanctioned application by evaluating a certificate, hash, or path of the source. |
---|---|
Bibliography: | Application Number: US201615383522 |