Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_c67d019bba41c0528c94615f572b52d2 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0281 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0236 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1491 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1408 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06 |
filingDate |
2016-11-11-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_dede2cdb231dd77fa9e0e6d17e9ff3db http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_003d9fbaef2eaf32a4ae39237f2db802 |
publicationDate |
2018-05-17-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
US-2018139236-A1 |
titleOfInvention |
Monitoring scan attempts in a network |
abstract |
Methods and devices for monitoring scan attempts in a network. Various embodiments provide enhancements to existing honeypot devices. These enhancements may include at least one of: (1) a port access module configured to make at least one honeypot port appear to be closed; (2) a mobility module configured to change the address of the honeypot within the network; (3) an emulation module configured to discover a network neighbor's profile and further configured to emulate the network neighbor's profile. |
isCitedBy |
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-3621265-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11374954-B1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11729189-B1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-10848507-B1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-112019544-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-112953882-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-10965699-B2 |
priorityDate |
2016-11-11-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |