Log in
Enquire now
‌

US Patent 12118086 Deception-based responses to security attacks

Patent 12118086 was granted and assigned to CrowdStrike on October, 2024 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Patent abstractTimelineTable: Further ResourcesReferences
Is a
Patent
Patent
1

Patent attributes

Patent Applicant
CrowdStrike
CrowdStrike
1
Current Assignee
CrowdStrike
CrowdStrike
1
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
1
Patent Number
121180861
Patent Inventor Names
David F. Diehl1
George Robert Kurtz1
Dmitri Alperovitch1
Sven Krasser1
Adam S. Meyers1
Date of Patent
October 15, 2024
1
Patent Application Number
168851691
Date Filed
May 27, 2020
1
Patent Citations
‌
US Patent 9497212 Detecting malicious resources in a network based upon active client reputation monitoring
1
‌
US Patent 7376969 Real time monitoring and analysis of events from multiple network security devices
1
‌
US Patent 7437766 Method and apparatus providing deception and/or altered operation in an information system operating system
1
‌
US Patent 8260914 Detecting DNS fast-flux anomalies
1
‌
US Patent 8549643 Using decoys by a data loss prevention system to protect against unscripted activity
1
‌
US Patent 10298598 Countering service enumeration through imposter-driven response
1
Patent Primary Examiner
‌
Monjur Rahim
1
CPC Code
‌
G06F 21/56
1
Patent abstract

Deception-based techniques for responding to security attacks are described herein. The techniques include transitioning a security attack to a monitored computing device posing as a computing device impacted by the security attack and enabling the adversary to obtain deceptive information from the monitored computing device. Also, the adversary may obtain a document configured to report identifying information of an entity opening the document, thereby identifying the adversary associated with the attack. Further, the techniques include determining that a domain specified in a domain name request is associated with malicious activity and responding to the request with a network address of a monitored computing device to cause the requesting process to communicate with the monitored computing device in place of an adversary server. Additionally, a service may monitor dormant domains names associated with malicious activity and, in response to a change, respond with an alert or a configuration update.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 12118086 Deception-based responses to security attacks

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.