SYSTEM AND METHOD FOR DETECTING AND/OR BLOCKING MALWARE ATTACKS USING DECOYS
In an approach to detecting and/or blocking malware attacks using decoys, one or more decoy files are created, files, where the one or more decoy files never return a read acknowledgement when read, thereby crippling at least a portion of a malware. The one or more decoy files are propagated to a sy...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In an approach to detecting and/or blocking malware attacks using decoys, one or more decoy files are created, files, where the one or more decoy files never return a read acknowledgement when read, thereby crippling at least a portion of a malware. The one or more decoy files are propagated to a system. Responsive to the malware initiating a read process on any of the one or more decoy files, the malware is detected. |
---|