International Business Machines Corporation
Integrity, theft protection and cyber deception using a deception-based filesystem
Last updated:
Abstract:
A decoy filesystem that curtails data theft and ensures file integrity protection through deception is described. To protect a base filesystem, the approach herein involves transparently creating multiple levels of stacking to enable various protection features, namely, monitoring file accesses, hiding and redacting sensitive files with baits, and injecting decoys onto fake system views that are purveyed to untrusted subjects, all while maintaining a pristine state to legitimate processes. In one implementation, a kernel hot-patch is used to seamlessly integrate the new filesystem module into live and existing environments.
Status:
Grant
Type:
Utility
Filling date:
18 Dec 2019
Issue date:
2 Nov 2021