WO2006092785A3 - Method and apparatus for the dynamic defensive masquerading of computing resources - Google Patents

Method and apparatus for the dynamic defensive masquerading of computing resources Download PDF

Info

Publication number
WO2006092785A3
WO2006092785A3 PCT/IL2006/000266 IL2006000266W WO2006092785A3 WO 2006092785 A3 WO2006092785 A3 WO 2006092785A3 IL 2006000266 W IL2006000266 W IL 2006000266W WO 2006092785 A3 WO2006092785 A3 WO 2006092785A3
Authority
WO
WIPO (PCT)
Prior art keywords
masquerading
computing resources
defensive
dynamic
scheme
Prior art date
Application number
PCT/IL2006/000266
Other languages
French (fr)
Other versions
WO2006092785A2 (en
Inventor
Asaf Greiner
Asaf Tor
Original Assignee
Beefense Ltd
Asaf Greiner
Asaf Tor
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beefense Ltd, Asaf Greiner, Asaf Tor filed Critical Beefense Ltd
Publication of WO2006092785A2 publication Critical patent/WO2006092785A2/en
Publication of WO2006092785A3 publication Critical patent/WO2006092785A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Abstract

An apparatus and method for the masquerading of computing resources operating within a networked computer environment is disclosed. The apparatus and method are installed and performed, respectively, at an execution location in front of a protected segment of the environment. The apparatus comprises a masquerading device having a masquerading scheme computation component, a masquerading scheme implementer component, and a masquerading scheme verification component, thereby providing a consistent non-genuine view of the computing resources.
PCT/IL2006/000266 2005-03-04 2006-02-28 Method and apparatus for the dynamic defensive masquerading of computing resources WO2006092785A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US65820405P 2005-03-04 2005-03-04
US60/658,204 2005-03-04

Publications (2)

Publication Number Publication Date
WO2006092785A2 WO2006092785A2 (en) 2006-09-08
WO2006092785A3 true WO2006092785A3 (en) 2007-10-18

Family

ID=36941550

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2006/000266 WO2006092785A2 (en) 2005-03-04 2006-02-28 Method and apparatus for the dynamic defensive masquerading of computing resources

Country Status (1)

Country Link
WO (1) WO2006092785A2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9094452B2 (en) 2012-08-01 2015-07-28 Bank Of America Corporation Method and apparatus for locating phishing kits
US9027126B2 (en) 2012-08-01 2015-05-05 Bank Of America Corporation Method and apparatus for baiting phishing websites

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020065930A1 (en) * 2000-03-07 2002-05-30 Rhodes David L. Collaborative host masquerading system
US20020066034A1 (en) * 2000-10-24 2002-05-30 Schlossberg Barry J. Distributed network security deception system
US6584569B2 (en) * 2000-03-03 2003-06-24 Sanctum Ltd. System for determining web application vulnerabilities

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6584569B2 (en) * 2000-03-03 2003-06-24 Sanctum Ltd. System for determining web application vulnerabilities
US20020065930A1 (en) * 2000-03-07 2002-05-30 Rhodes David L. Collaborative host masquerading system
US20020066034A1 (en) * 2000-10-24 2002-05-30 Schlossberg Barry J. Distributed network security deception system

Also Published As

Publication number Publication date
WO2006092785A2 (en) 2006-09-08

Similar Documents

Publication Publication Date Title
WO2007078913A3 (en) Cross-architecture execution optimization
WO2006112989A3 (en) Preconditioning for stochastic simulation of computer system performance
WO2008016489A3 (en) Methods and systems for modifying an integrity measurement based on user athentication
WO2007095552A3 (en) System and method for generating and executing a platform emulation based on a selected application
TW200636445A (en) Method and system for validating a computer system
WO2008042871A3 (en) Methods and apparatus for securely signing on to a website via a security website
TW200636580A (en) Method for the obtaining of deployment components to electronic devices
WO2005093564A3 (en) Methods and apparatus for achieving thermal management using processor manipulation
WO2009032036A3 (en) Compatible trust in a computing device
WO2005084124A3 (en) Device, system and method for accelerated modeling
WO2007130354A3 (en) Methods and apparatus providing computer and network security for polymorphic attacks
EP2023248A4 (en) Data processing device, method, program, integrated circuit, and program generating device
WO2007094942A3 (en) Dynamic threat event management system and method
MY151479A (en) Method and apparatus for detecting shellcode insertion
WO2006053103A3 (en) Method and apparatus for enforcing safety properties of computer programs by generating and solving constraints
WO2008114257A3 (en) Protection against impersonation attacks
WO2007098405A3 (en) Systems and methods for determining a flow of data
EP1930880A4 (en) Method and device for noise suppression, and computer program
WO2007131224A3 (en) Methods and apparatus to detect data dependencies in an instruction pipeline
WO2007011971A3 (en) Content dependency verification for a gaming machine
WO2008038196A3 (en) Protecting interfaces on processor architectures
WO2006096837A3 (en) System and method for managing software patches
EP1796061A4 (en) Encryption computing method, encryption device, and computer program
WO2007027312A3 (en) System and method providing variable complexity in a physics simulation
WO2007112162A3 (en) Selective instruction breakpoint generation

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

NENP Non-entry into the national phase

Ref country code: RU

WWW Wipo information: withdrawn in national office

Country of ref document: RU

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 06711248

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 06711248

Country of ref document: EP

Kind code of ref document: A2