Dell products l.p. (20240095357). NETWORK-STORAGE-BASED ATTACK DETECTION simplified abstract

From WikiPatents
Jump to navigation Jump to search

NETWORK-STORAGE-BASED ATTACK DETECTION

Organization Name

dell products l.p.

Inventor(s)

Tomer Shachar of Omer (IL)

Yevgeni Gehtman of Modi'in (IL)

Maxim Balin of Gan - Yavne (IL)

Arieh Don of Newton MA (US)

NETWORK-STORAGE-BASED ATTACK DETECTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240095357 titled 'NETWORK-STORAGE-BASED ATTACK DETECTION

Simplified Explanation

The abstract describes a patent application for a network-attached storage system that can detect and attract potential hackers by creating fake queries and responses.

  • The network-attached storage system monitors the network for file access commands from another computing system.
  • If a nefarious attempt to access information is detected, the system generates fake queries and responses to attract potential hackers.
  • The fake messages may contain information designed to lure attackers into revealing themselves.
  • When the system receives a request for information at the fake address or path, it notifies the computing system of a potential hacker infiltration.

Potential Applications

This technology could be used in cybersecurity systems to proactively detect and deter potential hackers before they can access sensitive information.

Problems Solved

This technology helps prevent unauthorized access to stored information by identifying and alerting to potential hacking attempts in real-time.

Benefits

The system provides an additional layer of security by actively monitoring and attracting potential hackers, allowing for quicker detection and response to security threats.

Potential Commercial Applications

This technology could be valuable for companies that store sensitive data and need advanced cybersecurity measures to protect against hacking attempts.

Possible Prior Art

One possible prior art could be intrusion detection systems that monitor network traffic for suspicious activity and alert system administrators of potential security breaches.

Unanswered Questions

How does the system determine which file access commands are nefarious attempts?

The abstract does not provide details on the specific criteria or algorithms used by the system to differentiate between legitimate and malicious file access commands.

What measures are in place to prevent false positives or unintended consequences of attracting potential hackers?

It is not clear from the abstract how the system mitigates the risk of inadvertently attracting hackers or causing disruptions to legitimate network activity.


Original Abstract Submitted

a network-attached storage of a computing system connected to a network may monitor the network for file access commands from equipment of another computing system to identify whether one of the file access commands corresponds to a nefarious attempt to access information stored at the storage. a service, application, or script, running at the storage, may create a fake query and a fake response thereto. the fake query or corresponding response may contain information generated to attract an attacker that may be using the other computing system to passively monitor the network and, upon detecting the attractive, but fake, message information, transmit a request according to an address, or path, or other information that the fake message(s) may include. the service/app/script may notify the computing system that a potential hacker has infiltrated the system when it receives a request for information at the fake address or path.