International Business Machines Corporation
Integrity, theft protection and cyber deception using a deception-based filesystem

Last updated:

Abstract:

A decoy filesystem that curtails data theft and ensures file integrity protection through deception is described. To protect a base filesystem, the approach herein involves transparently creating multiple levels of stacking to enable various protection features, namely, monitoring file accesses, hiding and redacting sensitive files with baits, and injecting decoys onto fake system views that are purveyed to untrusted subjects, all while maintaining a pristine state to legitimate processes. In one implementation, a kernel hot-patch is used to seamlessly integrate the new filesystem module into live and existing environments.

Status:
Grant
Type:

Utility

Filling date:

18 Dec 2019

Issue date:

2 Nov 2021