首页>
外国专利>
DETECTING NETWORK INTRUSION USING A DECOY CRYPTOGRAPHIC KEY.
DETECTING NETWORK INTRUSION USING A DECOY CRYPTOGRAPHIC KEY.
展开▼
机译:使用诱骗的加密密钥检测网络入侵。
展开▼
页面导航
摘要
著录项
相似文献
摘要
Systems and methods for detecting intrusion into a data network are disclosed. Such intrusion can be detected, for example, by providing at least two network devices in a data network. Each of the network devices has a decoy cryptographic key that is used to detect unauthorized data and an authentic cryptographic key that is used to encrypt authorized data (410). The first network device receives data from the second network device that is encrypted using the decoy cryptographic key (420). The first network device determines that the data is encrypted using the decoy cryptographic key (430). The first network device deletes or otherwise discards the data encrypted using the decoy cryptographic key (440). The first network device can generate an alert message instructing other network devices that the second network device is generating the unauthorized data (450). The alert message also instructs the other network devices to ignore data originating from the second network device.
展开▼