Invention Application
- Patent Title: MANAGING SECURITY BREACHES IN A NETWORKED COMPUTING ENVIRONMENT
- Patent Title (中): 管理网络计算环境中的安全漏洞
-
Application No.: US15251023Application Date: 2016-08-30
-
Publication No.: US20160373470A1Publication Date: 2016-12-22
- Inventor: Gregory J. Boss , Rick A. Hamilton, II , Jeffrey R. Hoy , Agueda M.H. Magro
- Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
- Main IPC: H04L29/06
- IPC: H04L29/06

Abstract:
Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.
Public/Granted literature
- US09894086B2 Managing security breaches in a networked computing environment Public/Granted day:2018-02-13
Information query