Amazon.com, Inc.
Allocating defective computing resources for honeypot services

Last updated:

Abstract:

The disclosure relates to provisioning honeypot computing services using computing resources in a defective computing resource pool. In one example, a computing system can generate a maliciousness score for a received resource allocation request, determine that the generated maliciousness score exceeds a maliciousness threshold and identify a computing resource in a defective resource pool that is eligible to satisfy the request. The system can then provision honeypot computing services to fulfill the request, using the identified computing resource in the defective resource pool.

Status:
Grant
Type:

Utility

Filling date:

28 Dec 2015

Issue date:

29 Mar 2022