17808554. HIGHLY COLLABORATIVE DECEPTIVE NETWORK ALLIANCE simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

HIGHLY COLLABORATIVE DECEPTIVE NETWORK ALLIANCE

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

Doga Tav of Fredericton (CA)

Russell Couturier of Worcester MA (US)

Ronald Williams of Austin TX (US)

Jeb R. Linton of Manassas VA (US)

HIGHLY COLLABORATIVE DECEPTIVE NETWORK ALLIANCE - A simplified explanation of the abstract

This abstract first appeared for US patent application 17808554 titled 'HIGHLY COLLABORATIVE DECEPTIVE NETWORK ALLIANCE

Simplified Explanation

The abstract of this patent application describes a method, computer system, and computer program product for preventing intrusions on a network. The invention involves creating a sandbox environment specifically designed for an attacker detected on the network and then moving the attacker into this environment.

  • The invention generates a sandbox environment in response to detecting an attacker on the network.
  • The sandbox environment is customized with dynamically generated data tailored to the target of the attacker.
  • The attacker is then isolated and moved into the sandbox environment.

Potential Applications

This technology can be applied in various areas where network security is crucial, such as:

  • Corporate networks: Protecting sensitive data and preventing unauthorized access.
  • Government networks: Safeguarding classified information and defending against cyber threats.
  • Financial institutions: Securing financial transactions and preventing fraud.
  • Healthcare systems: Protecting patient data and ensuring privacy.
  • E-commerce platforms: Preventing unauthorized access to customer information and securing online transactions.

Problems Solved

The technology addresses the following problems in network security:

  • Intrusion prevention: By isolating attackers in a sandbox environment, the system prevents them from accessing critical network resources.
  • Targeted defense: The dynamically generated data in the sandbox environment is tailored to the attacker's target, making it more difficult for them to exploit vulnerabilities.
  • Early detection: The system detects attackers on the network, allowing for proactive measures to be taken before any significant damage occurs.
  • Risk mitigation: By moving attackers to a controlled environment, the risk of them causing harm to the network or stealing sensitive information is minimized.

Benefits

The use of this technology offers several benefits:

  • Enhanced network security: By isolating attackers in a sandbox environment, the system provides an additional layer of protection against intrusions.
  • Customized defense: The dynamically generated data in the sandbox environment makes it more challenging for attackers to achieve their objectives.
  • Proactive approach: The system detects and responds to attackers in real-time, allowing for immediate action to prevent further damage.
  • Reduced impact: By containing attackers in a controlled environment, the potential damage they can cause to the network and its resources is limited.


Original Abstract Submitted

According to one embodiment, a method, computer system, and computer program product for preventing intrusions on a network is provided. The present invention may include generating a sandbox environment responsive to detecting an attacker in the network, wherein the sandbox environment comprises dynamically generated data tailored to the target of the attacker; and moving the attacker to the sandbox environment.