17808554. HIGHLY COLLABORATIVE DECEPTIVE NETWORK ALLIANCE simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)
HIGHLY COLLABORATIVE DECEPTIVE NETWORK ALLIANCE
Organization Name
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor(s)
Russell Couturier of Worcester MA (US)
Ronald Williams of Austin TX (US)
Jeb R. Linton of Manassas VA (US)
HIGHLY COLLABORATIVE DECEPTIVE NETWORK ALLIANCE - A simplified explanation of the abstract
This abstract first appeared for US patent application 17808554 titled 'HIGHLY COLLABORATIVE DECEPTIVE NETWORK ALLIANCE
Simplified Explanation
The abstract of this patent application describes a method, computer system, and computer program product for preventing intrusions on a network. The invention involves creating a sandbox environment specifically designed for an attacker detected on the network and then moving the attacker into this environment.
- The invention generates a sandbox environment in response to detecting an attacker on the network.
- The sandbox environment is customized with dynamically generated data tailored to the target of the attacker.
- The attacker is then isolated and moved into the sandbox environment.
Potential Applications
This technology can be applied in various areas where network security is crucial, such as:
- Corporate networks: Protecting sensitive data and preventing unauthorized access.
- Government networks: Safeguarding classified information and defending against cyber threats.
- Financial institutions: Securing financial transactions and preventing fraud.
- Healthcare systems: Protecting patient data and ensuring privacy.
- E-commerce platforms: Preventing unauthorized access to customer information and securing online transactions.
Problems Solved
The technology addresses the following problems in network security:
- Intrusion prevention: By isolating attackers in a sandbox environment, the system prevents them from accessing critical network resources.
- Targeted defense: The dynamically generated data in the sandbox environment is tailored to the attacker's target, making it more difficult for them to exploit vulnerabilities.
- Early detection: The system detects attackers on the network, allowing for proactive measures to be taken before any significant damage occurs.
- Risk mitigation: By moving attackers to a controlled environment, the risk of them causing harm to the network or stealing sensitive information is minimized.
Benefits
The use of this technology offers several benefits:
- Enhanced network security: By isolating attackers in a sandbox environment, the system provides an additional layer of protection against intrusions.
- Customized defense: The dynamically generated data in the sandbox environment makes it more challenging for attackers to achieve their objectives.
- Proactive approach: The system detects and responds to attackers in real-time, allowing for immediate action to prevent further damage.
- Reduced impact: By containing attackers in a controlled environment, the potential damage they can cause to the network and its resources is limited.
Original Abstract Submitted
According to one embodiment, a method, computer system, and computer program product for preventing intrusions on a network is provided. The present invention may include generating a sandbox environment responsive to detecting an attacker in the network, wherein the sandbox environment comprises dynamically generated data tailored to the target of the attacker; and moving the attacker to the sandbox environment.
(Ad) Transform your business with AI in minutes, not months
Trusted by 1,000+ companies worldwide