17945637. NETWORK-STORAGE-BASED ATTACK DETECTION simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

NETWORK-STORAGE-BASED ATTACK DETECTION

Organization Name

Dell Products L.P.

Inventor(s)

Tomer Shachar of Omer (IL)

Yevgeni Gehtman of Modi'in (IL)

Maxim Balin of Gan - Yavne (IL)

Arieh Don of Newton MA (US)

NETWORK-STORAGE-BASED ATTACK DETECTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17945637 titled 'NETWORK-STORAGE-BASED ATTACK DETECTION

Simplified Explanation

The abstract describes a patent application for a network-attached storage system that can detect and deter nefarious attempts to access stored information by creating fake queries and responses to attract potential hackers.

  • The network-attached storage system monitors file access commands from other computing systems on the network.
  • A service, application, or script running on the storage system generates fake queries and responses to lure potential attackers.
  • If the fake information is accessed, the system can identify and notify the computing system of a potential hacker infiltration.

Potential Applications

This technology could be used in cybersecurity systems to enhance network security and protect sensitive information from unauthorized access.

Problems Solved

This technology addresses the issue of unauthorized access to stored information by creating decoy messages to identify and deter potential hackers.

Benefits

The system provides an additional layer of security by actively detecting and responding to suspicious file access commands, helping to prevent data breaches and unauthorized access.

Potential Commercial Applications

This technology could be valuable for companies and organizations that handle sensitive data, such as financial institutions, healthcare providers, and government agencies, to enhance their cybersecurity measures.

Possible Prior Art

One possible prior art for this technology could be intrusion detection systems that monitor network traffic for suspicious activity and alert administrators of potential security threats.

Unanswered Questions

How does the system determine what constitutes a "nefarious attempt" to access information stored on the network-attached storage?

The abstract does not provide specific details on the criteria or algorithms used to identify nefarious attempts, leaving room for further exploration into the system's detection capabilities.

What measures are in place to prevent false positives or unintended consequences of creating fake queries and responses?

It is not clear from the abstract how the system distinguishes between legitimate and illegitimate file access commands, raising questions about the potential impact of false positives on system performance and user experience.


Original Abstract Submitted

A network-attached storage of a computing system connected to a network may monitor the network for file access commands from equipment of another computing system to identify whether one of the file access commands corresponds to a nefarious attempt to access information stored at the storage. A service, application, or script, running at the storage, may create a fake query and a fake response thereto. The fake query or corresponding response may contain information generated to attract an attacker that may be using the other computing system to passively monitor the network and, upon detecting the attractive, but fake, message information, transmit a request according to an address, or path, or other information that the fake message(s) may include. The service/app/script may notify the computing system that a potential hacker has infiltrated the system when it receives a request for information at the fake address or path.