Rapid7, Inc.
ATTACK SIGNATURE GENERATION
Last updated:
Abstract:
Methods and systems for detecting malicious activity on a network. The methods described herein involve gathering data regarding a first state of a computing environment, executing an attack tool to simulate malicious activity in the computing environment, and then gathering data regarding a second state of the computing environment. The methods described herein may then involve generating a signature based on changes between the first and second states, and then using the generated signature to detect malicious activity in a target network.
Status:
Application
Type:
Utility
Filling date:
23 Jul 2021
Issue date:
11 Nov 2021