Invention Grant
US09075992B2 Systems and methods for identifying, deterring and/or delaying attacks to a network using shadow networking techniques 有权
使用阴影网络技术识别,阻止和/或延迟攻击网络的系统和方法

Systems and methods for identifying, deterring and/or delaying attacks to a network using shadow networking techniques
Abstract:
Systems (100) and methods (2100) for identifying, deterring and/or delaying malicious attacks being waged on a Computer Network (“CN”). The methods involve implementing a Mission Plan (“MP”) at a first Network Node (“NN”). MP (1900, 1902) specifies that: a first IDentity Parameter (“IDP”) for a second NN has numerous possible values associated therewith; and at least two possible values are to be used in communications to and from the second NN in different timeslots of a time frame (2020-2026). At the first NN, a value for the first IDP, which is contained in a received packet, is compared with the possible values specified in MP to determine if the value is a “correct” value for a current timeslot. If it is determined that the value is not “correct” for the current timeslot, then the first NN performs actions to identify, deter or delay a possible malicious attack on CN.
Information query
Patent Agency Ranking
0/0