首页> 外国专利> DECEPTION-BASED RESPONSES TO SECURITY ATTACKS

DECEPTION-BASED RESPONSES TO SECURITY ATTACKS

机译:对安全攻击的基于欺骗的响应

摘要

Deception-based techniques for responding to security attacks are described herein. The techniques include transitioning a security attack to a monitored computing device posing as a computing device impacted by the security attack and enabling the adversary to obtain deceptive information from the monitored computing device. Also, the adversary may obtain a document configured to report identifying information of an entity opening the document, thereby identifying the adversary associated with the attack. Further, the techniques include determining that a domain specified in a domain name request is associated with malicious activity and responding to the request with a network address of a monitored computing device to cause the requesting process to communicate with the monitored computing device in place of an adversary server. Additionally, a service may monitor dormant domains names associated with malicious activity and, in response to a change, respond with an alert or a configuration update.
机译:本文描述了用于响应安全攻击的基于欺骗的技术。该技术包括将安全攻击转变为冒充受安全攻击影响的计算设备的受监视计算设备,并使对手能够从受监视计算设备获得欺骗性信息。而且,对手可以获得文档,该文档被配置为报告打开文档的实体的标识信息,从而标识与攻击相关联的对手。此外,这些技术包括确定域名请求中指定的域与恶意活动相关联,并使用被监视的计算设备的网络地址响应该请求,以使请求过程代替被监视的计算设备与被监视的计算设备进行通信。对手服务器。此外,服务可以监视与恶意活动相关的休眠域名,并响应更改而以警报或配置更新进行响应。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号