会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • COMPROMISED INSIDER HONEY POTS USING REVERSE HONEY TOKENS
    • 使用反向HONEY TOKENS的压缩内脏蜂蜜点
    • US20150135266A1
    • 2015-05-14
    • US14600855
    • 2015-01-20
    • Imperva, Inc.
    • Amichai ShulmanMichael ChernySagie Dulce
    • H04L29/06
    • H04L63/1491H04L63/0263H04L63/1416H04L63/20
    • According to one embodiment, a method for setting a trap to detect that an intruder has compromised a client end station (CES) in an attempt to gain unauthorized access to enterprise data provided by a server is described. The method includes causing a honey token to be placed on the CES secluded within a configuration repository, wherein the honey token is metadata and/or instructions indicating how applications can seemingly access the enterprise data but that is actually invalid, and the honey token is placed on the CES and not on the server. The method also includes causing attribute values to be installed on a security gateway for a security rule causing the security gateway to monitor network traffic for attempted use of the honey token, and to generate an alert when a set of one or more packets that include the honey token are received.
    • 根据一个实施例,描述了一种用于设置陷阱以检测入侵者已经破坏了客户端站(CES)以尝试获得未经授权的访问由服务器提供的企业数据的方法。 该方法包括使蜂蜜令牌放置在配置库内隐藏的CES上,其中蜂蜜令牌是元数据和/或指示应用程序如何看起来访问企业数据但实际上无效的指令,并且蜂蜜令牌被放置 在CES上,而不是在服务器上。 该方法还包括使属性值安装在用于安全规则的安全网关上的安全规则,导致安全网关监视网络流量以尝试使用蜂蜜令牌,并且当包括一个或多个分组的一个或多个分组的集合时生成警报 收到蜂蜜令牌。
    • 5. 发明授权
    • Compromised insider honey pots using reverse honey tokens
    • 使用反向蜂蜜令牌的内疚蜜罐
    • US08973142B2
    • 2015-03-03
    • US13934099
    • 2013-07-02
    • Imperva Inc.
    • Amichai ShulmanMichael ChernySagie Dulce
    • G06F12/14H04L29/06
    • H04L63/1491H04L63/0263H04L63/1416H04L63/20
    • According to one embodiment, a method for setting a trap to detect that an intruder has compromised a client end station (CES) in an attempt to gain unauthorized access to enterprise data provided by a server is described. The method includes causing a honey token to be placed on the CES secluded within a configuration repository, wherein the honey token is metadata and/or instructions indicating how applications can seemingly access the enterprise data but that is actually invalid, and the honey token is placed on the CES and not on the server. The method also includes causing attribute values to be installed on a security gateway for a security rule causing the security gateway to monitor network traffic for attempted use of the honey token, and to generate an alert when a set of one or more packets that include the honey token are received.
    • 根据一个实施例,描述了一种用于设置陷阱以检测入侵者已经破坏了客户端站(CES)以尝试获得未经授权的访问由服务器提供的企业数据的方法。 该方法包括使蜂蜜令牌放置在配置库内隐藏的CES上,其中蜂蜜令牌是元数据和/或指示应用程序如何看起来访问企业数据但实际上无效的指令,并且蜂蜜令牌被放置 在CES上,而不是在服务器上。 该方法还包括使属性值安装在用于安全规则的安全网关上的安全规则,导致安全网关监视网络流量以尝试使用蜂蜜令牌,并且当包括一个或多个分组的一个或多个分组的集合时生成警报 收到蜂蜜令牌。