Countering service enumeration through imposter-driven response

Techniques for improving computer system security by detecting and responding to attacks on computer systems are described herein. A computer system monitors communications requests from external systems and, as a result of detecting one or more attacks on the computer system, the computer system re...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Stathakopoulos, George Nikolaos, McClintock, Jon Arron
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Stathakopoulos, George Nikolaos
McClintock, Jon Arron
description Techniques for improving computer system security by detecting and responding to attacks on computer systems are described herein. A computer system monitors communications requests from external systems and, as a result of detecting one or more attacks on the computer system, the computer system responds to the attacks by analyzing the behavior of the attacker, relating that behavior to one or more attack profiles and creating a simulated environment to respond to the attack based in part on the attack profiles. The simulated environment responds to the attack by communicating with the attacker.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US10298598B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US10298598B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US10298598B13</originalsourceid><addsrcrecordid>eNrjZLB3zi_NK0ktysxLVyhOLSrLTE5VSM0rzU0tSizJzM9TKMkoyi9Nz1DIzC3ILwaq000pyixLzVMoSi0uyM8rTuVhYE1LzClO5YXS3AyKbq4hzh66qQX58UA1icmpeakl8aHBhgZGlhamlhZOhsbEqAEAI1QyWg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Countering service enumeration through imposter-driven response</title><source>esp@cenet</source><creator>Stathakopoulos, George Nikolaos ; McClintock, Jon Arron</creator><creatorcontrib>Stathakopoulos, George Nikolaos ; McClintock, Jon Arron</creatorcontrib><description>Techniques for improving computer system security by detecting and responding to attacks on computer systems are described herein. A computer system monitors communications requests from external systems and, as a result of detecting one or more attacks on the computer system, the computer system responds to the attacks by analyzing the behavior of the attacker, relating that behavior to one or more attack profiles and creating a simulated environment to respond to the attack based in part on the attack profiles. The simulated environment responds to the attack by communicating with the attacker.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190521&amp;DB=EPODOC&amp;CC=US&amp;NR=10298598B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190521&amp;DB=EPODOC&amp;CC=US&amp;NR=10298598B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Stathakopoulos, George Nikolaos</creatorcontrib><creatorcontrib>McClintock, Jon Arron</creatorcontrib><title>Countering service enumeration through imposter-driven response</title><description>Techniques for improving computer system security by detecting and responding to attacks on computer systems are described herein. A computer system monitors communications requests from external systems and, as a result of detecting one or more attacks on the computer system, the computer system responds to the attacks by analyzing the behavior of the attacker, relating that behavior to one or more attack profiles and creating a simulated environment to respond to the attack based in part on the attack profiles. The simulated environment responds to the attack by communicating with the attacker.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLB3zi_NK0ktysxLVyhOLSrLTE5VSM0rzU0tSizJzM9TKMkoyi9Nz1DIzC3ILwaq000pyixLzVMoSi0uyM8rTuVhYE1LzClO5YXS3AyKbq4hzh66qQX58UA1icmpeakl8aHBhgZGlhamlhZOhsbEqAEAI1QyWg</recordid><startdate>20190521</startdate><enddate>20190521</enddate><creator>Stathakopoulos, George Nikolaos</creator><creator>McClintock, Jon Arron</creator><scope>EVB</scope></search><sort><creationdate>20190521</creationdate><title>Countering service enumeration through imposter-driven response</title><author>Stathakopoulos, George Nikolaos ; McClintock, Jon Arron</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US10298598B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Stathakopoulos, George Nikolaos</creatorcontrib><creatorcontrib>McClintock, Jon Arron</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Stathakopoulos, George Nikolaos</au><au>McClintock, Jon Arron</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Countering service enumeration through imposter-driven response</title><date>2019-05-21</date><risdate>2019</risdate><abstract>Techniques for improving computer system security by detecting and responding to attacks on computer systems are described herein. A computer system monitors communications requests from external systems and, as a result of detecting one or more attacks on the computer system, the computer system responds to the attacks by analyzing the behavior of the attacker, relating that behavior to one or more attack profiles and creating a simulated environment to respond to the attack based in part on the attack profiles. The simulated environment responds to the attack by communicating with the attacker.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US10298598B1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Countering service enumeration through imposter-driven response
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T13%3A09%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Stathakopoulos,%20George%20Nikolaos&rft.date=2019-05-21&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS10298598B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true