WO2006092785A3 - Method and apparatus for the dynamic defensive masquerading of computing resources - Google Patents
Method and apparatus for the dynamic defensive masquerading of computing resources Download PDFInfo
- Publication number
- WO2006092785A3 WO2006092785A3 PCT/IL2006/000266 IL2006000266W WO2006092785A3 WO 2006092785 A3 WO2006092785 A3 WO 2006092785A3 IL 2006000266 W IL2006000266 W IL 2006000266W WO 2006092785 A3 WO2006092785 A3 WO 2006092785A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- masquerading
- computing resources
- defensive
- dynamic
- scheme
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Abstract
An apparatus and method for the masquerading of computing resources operating within a networked computer environment is disclosed. The apparatus and method are installed and performed, respectively, at an execution location in front of a protected segment of the environment. The apparatus comprises a masquerading device having a masquerading scheme computation component, a masquerading scheme implementer component, and a masquerading scheme verification component, thereby providing a consistent non-genuine view of the computing resources.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US65820405P | 2005-03-04 | 2005-03-04 | |
US60/658,204 | 2005-03-04 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006092785A2 WO2006092785A2 (en) | 2006-09-08 |
WO2006092785A3 true WO2006092785A3 (en) | 2007-10-18 |
Family
ID=36941550
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IL2006/000266 WO2006092785A2 (en) | 2005-03-04 | 2006-02-28 | Method and apparatus for the dynamic defensive masquerading of computing resources |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2006092785A2 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9094452B2 (en) | 2012-08-01 | 2015-07-28 | Bank Of America Corporation | Method and apparatus for locating phishing kits |
US9027126B2 (en) | 2012-08-01 | 2015-05-05 | Bank Of America Corporation | Method and apparatus for baiting phishing websites |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020065930A1 (en) * | 2000-03-07 | 2002-05-30 | Rhodes David L. | Collaborative host masquerading system |
US20020066034A1 (en) * | 2000-10-24 | 2002-05-30 | Schlossberg Barry J. | Distributed network security deception system |
US6584569B2 (en) * | 2000-03-03 | 2003-06-24 | Sanctum Ltd. | System for determining web application vulnerabilities |
-
2006
- 2006-02-28 WO PCT/IL2006/000266 patent/WO2006092785A2/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6584569B2 (en) * | 2000-03-03 | 2003-06-24 | Sanctum Ltd. | System for determining web application vulnerabilities |
US20020065930A1 (en) * | 2000-03-07 | 2002-05-30 | Rhodes David L. | Collaborative host masquerading system |
US20020066034A1 (en) * | 2000-10-24 | 2002-05-30 | Schlossberg Barry J. | Distributed network security deception system |
Also Published As
Publication number | Publication date |
---|---|
WO2006092785A2 (en) | 2006-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007078913A3 (en) | Cross-architecture execution optimization | |
WO2006112989A3 (en) | Preconditioning for stochastic simulation of computer system performance | |
WO2008016489A3 (en) | Methods and systems for modifying an integrity measurement based on user athentication | |
WO2007095552A3 (en) | System and method for generating and executing a platform emulation based on a selected application | |
TW200636445A (en) | Method and system for validating a computer system | |
WO2008042871A3 (en) | Methods and apparatus for securely signing on to a website via a security website | |
TW200636580A (en) | Method for the obtaining of deployment components to electronic devices | |
WO2005093564A3 (en) | Methods and apparatus for achieving thermal management using processor manipulation | |
WO2009032036A3 (en) | Compatible trust in a computing device | |
WO2005084124A3 (en) | Device, system and method for accelerated modeling | |
WO2007130354A3 (en) | Methods and apparatus providing computer and network security for polymorphic attacks | |
EP2023248A4 (en) | Data processing device, method, program, integrated circuit, and program generating device | |
WO2007094942A3 (en) | Dynamic threat event management system and method | |
MY151479A (en) | Method and apparatus for detecting shellcode insertion | |
WO2006053103A3 (en) | Method and apparatus for enforcing safety properties of computer programs by generating and solving constraints | |
WO2008114257A3 (en) | Protection against impersonation attacks | |
WO2007098405A3 (en) | Systems and methods for determining a flow of data | |
EP1930880A4 (en) | Method and device for noise suppression, and computer program | |
WO2007131224A3 (en) | Methods and apparatus to detect data dependencies in an instruction pipeline | |
WO2007011971A3 (en) | Content dependency verification for a gaming machine | |
WO2008038196A3 (en) | Protecting interfaces on processor architectures | |
WO2006096837A3 (en) | System and method for managing software patches | |
EP1796061A4 (en) | Encryption computing method, encryption device, and computer program | |
WO2007027312A3 (en) | System and method providing variable complexity in a physics simulation | |
WO2007112162A3 (en) | Selective instruction breakpoint generation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
NENP | Non-entry into the national phase |
Ref country code: RU |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: RU |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 06711248 Country of ref document: EP Kind code of ref document: A2 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06711248 Country of ref document: EP Kind code of ref document: A2 |