US 12,289,342 B2
Deploying just in time (JIT) deceptions at scale in networks
Vincent E. Parla, North Hampton, NH (US)
Assigned to Cisco Technology, Inc., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Mar. 15, 2023, as Appl. No. 18/122,074.
Prior Publication US 2024/0314167 A1, Sep. 19, 2024
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1491 (2013.01) [H04L 63/20 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
determining, by a deception service associated with a network, a threshold amount of computing resource types associated with the network;
executing a dynamic amount of deception host computing devices to satisfy the threshold amount of computing resource types associated with the network;
determining a number of deceptions to emulate on the network;
generating the number of the deceptions to emulate on the deception host computing devices, the deceptions being associated with the computing resource types;
storing a first mapping between the deceptions and the deception host computing devices, the first mapping being based at least in part on protocols associated with the deceptions and the computing resource types associated with the deception host computing devices; and
deploying the deceptions to the deception host computing devices based at least in part on the first mapping.