US 12,107,889 B2
Cloud-based deception technology utilizing zero trust to identify threat intelligence, telemetry, and emerging adversary tactics and techniques
Bhavesh Kothari, Pune (IN); Sahir Hidayatullah, Mumbai (IN); Deepen Desai, San Ramon, CA (US); Akshay Shah, Bangalore (IN); and Reshad Patuck, Mumbai (IN)
Assigned to Zscaler, Inc., San Jose, CA (US)
Filed by Zscaler, Inc., San Jose, CA (US)
Filed on Jan. 8, 2022, as Appl. No. 17/571,460.
Claims priority of application No. 202111053875 (IN), filed on Nov. 23, 2021.
Prior Publication US 2023/0164182 A1, May 25, 2023
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1491 (2013.01) [H04L 63/1416 (2013.01); H04L 63/1425 (2013.01)] 20 Claims
OG exemplary drawing
 
9. A method comprising steps of:
hosting a decoy cloud environment for a customer that contains a plurality of decoys and that is hosted and separated from a real environment of the customer, wherein the plurality of decoys are associated with a plurality of fake assets planted on one or more user devices associated with the customer;
receiving traffic from a user associated with the customer via inline monitoring for traffic inspection;
detecting whether the traffic is related to accessing a fake asset on a user device associated with the user or the traffic is unrelated to any fake asset on the user device;
responsive to the traffic being related to accessing the fake asset, rerouting the traffic to the decoy cloud environment as part of the inline monitoring, and monitoring activity associated with the fake asset in the decoy cloud environment, wherein the routing is performed based on deception policies created based on real user access policy; and
responsive to the traffic being unrelated to any fake asset, processing the traffic for threat protection and data protection and either allowing or blocking the unrelated traffic based thereon.