Computer network defense system
| DWPI Title: Method for protecting virtual machines in e.g. marketing activities, involves moving group of network connections for group of virtual machines, and enabling protecting group of virtual machines from actions performed by adversary |
| Abstract: A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary. |
| Use: Method for protecting virtual machines in payroll activities, human resource activities, research activities, sales activities and marketing activities. |
| Advantage: The method enables ensuring that modification can corrupt the network traffic in a manner that prevents file reconstruction when a transmission of the file has completed when a modification in modifications is made to network traffic. |
| Novelty: The method involves creating an emulation (124) of components from an operating network (106) in a deception network (108) by a computer system (110), where the components are accessible by a group of the cloned virtual machines. A group of network connections for the group of the virtual machines in the operating network used by the adversary is moved from the group of the virtual machines in the operating network to the group of the cloned virtual machines in the deception network. Protecting the group of the virtual machines from actions (118) performed by an adversary (116) is enabled. |
| Filed: 10/28/2015 |
| Application Number: US14925645A |
| Tech ID: SD 13370.0 |
| This invention was made with Government support under Contract No. DE-NA0003525 awarded by the United States Department of Energy/National Nuclear Security Administration. The Government has certain rights in the invention. |
| Data from Derwent World Patents Index, provided by Clarivate All rights reserved. Republication or redistribution of Clarivate content, including by framing or similar means, is prohibited without the prior written consent of Clarivate. Clarivate and its logo, as well as all other trademarks used herein are trademarks of their respective owners and used under license. |