Search International and National Patent Collections
|1. (WO2018025157) DEPLOYING DECEPTION CAMPAIGNS USING COMMUNICATION BREADCRUMBS|
|Title:||DEPLOYING DECEPTION CAMPAIGNS USING COMMUNICATION BREADCRUMBS|
A computer implemented method of detecting unauthorized access to a protected network by detecting a usage of dynamically updated deception communication, comprising deploying, in a protected network, a plurality of decoy endpoints configured to transmit one or more communication deception data objects encoded according to one or more communication protocols used in the protected network, instructing a first decoy endpoint of the plurality of decoy endpoints to transmit the communication deception data object(s) to a second decoy endpoint of the plurality of decoy endpoints, monitoring the protected network to detect a usage of data contained in the one or more communication deception data object, detecting one or more potential unauthorized operations based on analysis of the detection and initiating one or more actions according to the detection.