skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Computer network defense system

Patent ·
OSTI ID:1375930

A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

Research Organization:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Sponsoring Organization:
USDOE
DOE Contract Number:
AC04-94AL85000
Assignee:
National Technology & Engineering Solutions of Sandia, LLC
Patent Number(s):
9,742,804
Application Number:
14/925,645
OSTI ID:
1375930
Resource Relation:
Patent File Date: 2015 Oct 28
Country of Publication:
United States
Language:
English

References (10)

Synchronizing a honey network configuration to reflect a target network environment patent November 2016
System and method for analyzing unauthorized intrusion into a computer network patent-application January 2008
System and Method for Adaptive Tarpits Using Distributed Virtual Machines patent-application September 2008
Distributed trusted virtualization platform patent-application August 2009
System and Method for Sampling Forensic Data of Unauthorized Activities Using Executability States patent-application December 2011
System and Method for Identifying Unauthorized Activities on a Computer System Using a Data Structure Model patent-application December 2011
Network Intrusion Diversion Using a Software Defined Network patent-application March 2016
Dynamic Security Sandboxing Based on Intruder Intent patent-application May 2016
Improving deception in honeynet: Through data manipulation conference December 2014
Changing the game: The art of deceiving sophisticated attackers conference June 2014