Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for generating tripwire files

A file and network generation technology, applied in transmission systems, electrical components, instruments, etc.

Active Publication Date: 2021-12-03
GEN DIGITAL INC
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It may not be possible to protect users from new security threats, including ransomware as outlined above, by optimizing traditional security mechanisms such as conventional antivirus and firewall products

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for generating tripwire files
  • Systems and methods for generating tripwire files
  • Systems and methods for generating tripwire files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present disclosure generally relates to systems and methods for generating tripwire files. As will be explained in more detail below, the disclosed systems and methods may involve a polymorphic evolution process to identify tripwire file generation properties and algorithms that outperform other properties and algorithms. By iteratively selecting attributes and algorithms that yield superior performance, the disclosed systems and methods can incrementally improve the general performance and generation of tripwire files and more effectively detect corresponding security threats.

[0021] The following will refer to Figure 1 to Figure 2 A detailed description of an exemplary system for generating tripwire files is provided. will also combine Figure 3 to Figure 5 A detailed description of the corresponding computer-implemented method is provided. In addition, will combine the Image 6 with Figure 7 A detailed description of an exemplary computing system and net...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a computer-implemented method for generating a tripwire file, the computer-implemented method may include (1) generating an initial tripwire file based on an initial tripwire generation calculation, the initial tripwire file being configured such that modification of the initial tripwire file triggers an investigation of a security breach; (2) generating a subsequent tripwire file based on a subsequent tripwire generation calculation that differs from the initial tripwire generation calculation along at least one dimension generating a calculation; (3) receiving automated feedback indicating whether at least one of the initial tripwire file and the subsequent tripwire file fails to enable detection of a security threat; and (4) based on indications of the initial tripwire file and The automated feedback of whether at least one of the subsequent tripwire documents fails to detect the security threat is used to adjust automatic generation of a third tripwire document. Various other methods, systems, and computer-readable media are also disclosed herein.

Description

Background technique [0001] Individuals and organizations often seek to protect their computing resources from corresponding security threats. For example, enterprise organizations can install client-side antivirus products on their computing devices to protect those devices from these security threats. Similarly, enterprise organizations can install gateway-side firewalls to filter out unwanted network traffic from entering those organizations' computing networks. [0002] Attackers who pose security threats to computing resources are becoming more sophisticated and aggressive. For example, some attackers have developed a new type of security threat called ransomware. Ransomware may lock one or more computing resources from a user while demanding that the user perform a certain task, such as paying a fee, in exchange for releasing the computing resources from the lock. For example, ransomware may lock one or more of the backup files that a user backs up to a cloud-based st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55H04L29/06G06F21/56
CPCG06F21/554G06F21/568H04L63/1491G06F21/566G06F21/54G06F2221/034
Inventor L·顾I·索科洛夫M·鲍彻
Owner GEN DIGITAL INC