17945637. NETWORK-STORAGE-BASED ATTACK DETECTION simplified abstract (Dell Products L.P.)
Contents
- 1 NETWORK-STORAGE-BASED ATTACK DETECTION
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 NETWORK-STORAGE-BASED ATTACK DETECTION - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
NETWORK-STORAGE-BASED ATTACK DETECTION
Organization Name
Inventor(s)
Yevgeni Gehtman of Modi'in (IL)
Maxim Balin of Gan - Yavne (IL)
NETWORK-STORAGE-BASED ATTACK DETECTION - A simplified explanation of the abstract
This abstract first appeared for US patent application 17945637 titled 'NETWORK-STORAGE-BASED ATTACK DETECTION
Simplified Explanation
The abstract describes a patent application for a network-attached storage system that can detect and deter nefarious attempts to access stored information by creating fake queries and responses to attract potential hackers.
- The network-attached storage system monitors file access commands from other computing systems on the network.
- A service, application, or script running on the storage system generates fake queries and responses to lure potential attackers.
- If the fake information is accessed, the system can identify and notify the computing system of a potential hacker infiltration.
Potential Applications
This technology could be used in cybersecurity systems to enhance network security and protect sensitive information from unauthorized access.
Problems Solved
This technology addresses the issue of unauthorized access to stored information by creating decoy messages to identify and deter potential hackers.
Benefits
The system provides an additional layer of security by actively detecting and responding to suspicious file access commands, helping to prevent data breaches and unauthorized access.
Potential Commercial Applications
This technology could be valuable for companies and organizations that handle sensitive data, such as financial institutions, healthcare providers, and government agencies, to enhance their cybersecurity measures.
Possible Prior Art
One possible prior art for this technology could be intrusion detection systems that monitor network traffic for suspicious activity and alert administrators of potential security threats.
Unanswered Questions
How does the system determine what constitutes a "nefarious attempt" to access information stored on the network-attached storage?
The abstract does not provide specific details on the criteria or algorithms used to identify nefarious attempts, leaving room for further exploration into the system's detection capabilities.
What measures are in place to prevent false positives or unintended consequences of creating fake queries and responses?
It is not clear from the abstract how the system distinguishes between legitimate and illegitimate file access commands, raising questions about the potential impact of false positives on system performance and user experience.
Original Abstract Submitted
A network-attached storage of a computing system connected to a network may monitor the network for file access commands from equipment of another computing system to identify whether one of the file access commands corresponds to a nefarious attempt to access information stored at the storage. A service, application, or script, running at the storage, may create a fake query and a fake response thereto. The fake query or corresponding response may contain information generated to attract an attacker that may be using the other computing system to passively monitor the network and, upon detecting the attractive, but fake, message information, transmit a request according to an address, or path, or other information that the fake message(s) may include. The service/app/script may notify the computing system that a potential hacker has infiltrated the system when it receives a request for information at the fake address or path.