DATA STORAGE MANAGEMENT SYSTEM INTEGRATING CYBER THREAT DECEPTION

    公开(公告)号:US20240056481A1

    公开(公告)日:2024-02-15

    申请号:US17901685

    申请日:2022-09-01

    IPC分类号: H04L9/40

    CPC分类号: H04L63/1491 H04L63/1433

    摘要: A cyber threat detection and deception system interoperates synergistically with a data storage management system. As a proxy for identifying crown jewels among many and diverse data assets in a network, the illustrative cyber threat detection and deception system uses service level information obtained from the data storage management system, e.g., RPO, RTO, append-only secondary storage, synthetic-full frequency, etc. The cyber threat detection and deception system emulates proprietary protocols used by storage management technologies such as the data storage management system, etc. By creating emulation traps and an emulation lexicon of these storage-related protocols, the illustrative cyber threat detection and deception system can create and execute cyber deception plans for the proprietary storage management assets. Synergistically, the illustrative data storage management system is configured to respond to alerts and react to other information received from the cyber threat detection and deception system by taking certain corrective and/or protective actions.

    AUTOMATIC GENERATION OF MALWARE DETECTION TRAPS

    公开(公告)号:US20240320339A1

    公开(公告)日:2024-09-26

    申请号:US18735835

    申请日:2024-06-06

    摘要: A system and method of deployment of malware detection traps by at least one processor may include performing a first interrogation of a first Network Asset (NA) of a specific NA family; determining, based on the interrogation, a value of one or more first NA property data elements of the first NA; obtaining one or more second NA property data elements corresponding to the specific NA family; integrating the one or more first NA property data elements and the one or more second NA property data elements to generate a template data element, corresponding to the specific NA family; producing, from the template data element, a malware detection trap module; and deploying, on one or more computing devices of a computer network, one or more instantiations of the malware detection trap module as decoys of the first NA.