首页>
外国专利>
Creation of fictitious identities to obfuscate hacking of internal networks
Creation of fictitious identities to obfuscate hacking of internal networks
展开▼
机译:创建虚拟身份以模糊内部网络的黑客攻击
展开▼
页面导航
摘要
著录项
相似文献
摘要
Introduced here are security techniques for networks. More specifically, fictitious identities (also referred to as “bogus identities”) can be willfully created and injected into the network in order to obfuscate those who are not authorized to access the network. For example, such techniques may be used to befuddle hackers attempting to breach an internal network. The fictitious identities can be created by bypassing the operating system of computing device(s) residing within the network and deploying the fictitious identities within an operating system process responsible for implementing a security policy. Such action utilizes a limited amount of memory. The fictitious identities create a false visual of the network that is visible to any threat, regardless of where the threat is located in the network. Moreover, the fictitious identities may not infringe upon the topology of the network or affect the ability of authenticated users to continue using the network.
展开▼