US 12,339,963 B2
Unauthorized data encryption detection based on pattern matching at a storage system
Joseph E. Algieri, Santa Clara, CA (US); and Alex Veprinsky, San Jose, CA (US)
Assigned to Hewlett Packard Enterprise Development LP, Spring, TX (US)
Filed by HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, Houston, TX (US)
Filed on May 10, 2022, as Appl. No. 17/662,764.
Prior Publication US 2023/0367876 A1, Nov. 16, 2023
Int. Cl. G06F 21/56 (2013.01)
CPC G06F 21/561 (2013.01) [G06F 2221/034 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A non-transitory machine-readable storage medium comprising instructions that upon execution cause a storage system to:
intercept, at the storage system, a write request communicated over a network from a requester in a host system, the write request to write data of a trap volume comprising a honeypot storing dummy data;
compute a value by applying, at the storage system, a hash function on storage location information at which the data of the write request is to be stored, the storage location information specifying a logical address or a physical address of a storage location in the trap volume;
determine, at the storage system, whether the data of the write request targeting the trap volume matches the computed value; and
in response to determining that the data of the write request targeting the trap volume does not match the computed value, indicate that the write request from the requester in the host system has been corrupted by malware that has performed an unauthorized encryption on the data.