International Business Machines Corporation
Network attack tainting and tracking

Last updated:

Abstract:

A technique for network attack tainting and tracking includes monitoring data packets received from a network for a malicious request. Responsive to detecting a malicious request, a forensic token is created having information pertaining to the malicious request that is configured to be stored by a source of the malicious request and discoverable regarding involvement of the source in the malicious request. The forensic token is injected into a response message, and the response message is then transmitted to the source of the request as a response to the request.

Status:
Grant
Type:

Utility

Filling date:

7 May 2020

Issue date:

14 Dec 2021