System and a Method for Identifying the Presence of Malware Using Mini-Traps Set At Network Endpoints
    1.
    发明申请
    System and a Method for Identifying the Presence of Malware Using Mini-Traps Set At Network Endpoints 有权
    系统和使用迷你陷阱识别恶意软件存在的方法设置在网络端点

    公开(公告)号:US20160072838A1

    公开(公告)日:2016-03-10

    申请号:US14844844

    申请日:2015-09-03

    CPC classification number: H04L63/1491 H04L63/145

    Abstract: A system for identifying the presence of advanced persistent threats on a network including a plurality of resources, interconnected to form a network, at least one decoy resource, at least one mini-trap installed on at least one of the plurality of resources and functionally associated with at one of the at least one decoy resource, the at least one mini-trap comprising deceptive information directing malware accessing the at least one mini-trap to the decoy resource associated therewith, and a manager node forming part of the network, locally or remotely, and configured to manage placement of the at least one mini-trap on the at least one of the plurality of resources and association between the at least one mini-trap and the decoy resource associated therewith.

    Abstract translation: 用于识别网络上存在高级持续威胁的系统,包括互连以形成网络的多个资源,至少一个诱饵资源,至少一个安装在所述多个资源中的至少一个资源上的功能相关联的小型陷阱 在所述至少一个诱饵资源中的至少一个诱饵资源之一中,所述至少一个迷你陷阱包括欺骗性信息,其将恶意软件访问至少一个迷你陷阱指向与其相关联的诱饵资源,以及管理器节点,其形成网络的一部分,在本地或 并且被配置为管理所述多个资源中的至少一个资源上的所述至少一个迷你陷阱的放置以及所述至少一个迷你陷阱与与其相关联的诱饵资源之间的关联。

    System and a Method for Identifying Malware Network Activity Using a Decoy Environment
    5.
    发明申请
    System and a Method for Identifying Malware Network Activity Using a Decoy Environment 有权
    系统和使用诱骗环境识别恶意软件网络活动的方法

    公开(公告)号:US20160080414A1

    公开(公告)日:2016-03-17

    申请号:US14847315

    申请日:2015-09-08

    Abstract: A system for gathering information about malware and a method of use therefor, the system comprising a working environment including physical working environment servers, physical working environment endpoints, a working environment network, a switch, and a router directing traffic between said working environment network and an external network, a decoy environment including at least one physical machine, a decoy environment server, a decoy environment endpoint, a decoy environment network and a decoy environment router, a file directing mechanism directing at least some files to the decoy environment, and a threat tracking mechanism tracking and observing actions triggered by the files in the decoy environment.

    Abstract translation: 一种用于收集关于恶意软件的信息及其使用方法的系统,所述系统包括工作环境,所述工作环境包括物理工作环境服务器,物理工作环境端点,工作环境网络,交换机以及指导所述工作环境网络和 外部网络,包括至少一个物理机器的诱饵环境,诱饵环境服务器,诱饵环境端点,诱饵环境网络和诱饵环境路由器,将至少一些文件引导到诱饵环境的文件引导机构,以及 威胁跟踪机制跟踪和观察由诱骗环境中的文件触发的操作。

Patent Agency Ranking