Log in
Enquire now
‌

US Patent 10382484 Detecting attackers who target containerized clusters

Patent 10382484 was granted and assigned to Illusive Networks on August, 2019 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent

Patent attributes

Patent Applicant
Illusive Networks
Illusive Networks
Current Assignee
Illusive Networks
Illusive Networks
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
Patent Number
10382484
Patent Inventor Names
Hanoch Shayevitz0
Matan Kubovsky0
Yair Fried0
Date of Patent
August 13, 2019
Patent Application Number
16163579
Date Filed
October 18, 2018
Patent Citations Received
‌
US Patent 12026257 Method of malware detection and system thereof
0
‌
US Patent 11838306 Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
0
‌
US Patent 11876819 Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
0
‌
US Patent 11888897 Implementing decoys in a network environment
0
‌
US Patent 11886591 Method of remediating operations performed by a program and system thereof
0
‌
US Patent 11973781 Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
0
‌
US Patent 11997139 Deceiving attackers accessing network data
0
‌
US Patent 10509905 Ransomware mitigation system
...
Patent Primary Examiner
‌
Thanhnga B Truong
Patent abstract

A method for operation of a deception management server, for detecting and hindering attackers who target containerized clusters of a network, including learning the network environment, including finding existing container instances, finding existing services and relationships, extracting naming conventions in the environment, and classifying the most important assets in the environment, creating deceptions based on the learning phase, the deceptions including one or more of (i) secrets, (ii) environment variables pointing to deceptive databases, web servers or active directories, (iii) mounts, (iv) additional container instances comprising one or more of file server, database, web applications and SSH, (v) URLs to external services, and (vi) namespaces to fictional environments, planting the created deceptions via a container orchestrator, via an SSH directly to the containers, or via the container registry, and issuing an alert when an attacker attempts to connect to a deceptive entity.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 10382484 Detecting attackers who target containerized clusters

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.