Rapid7, Inc.
BEHAVIOR MANAGEMENT OF DECEPTION SYSTEM FLEETS
Last updated:
Abstract:
Disclosed herein are methods, systems, and processes for managing and controlling the collective behavior of deception computing system fleets. A malicious attack initiated by a malicious attacker received by a honeypot that is part of a network along with other honeypots is detected. Information associated with the malicious attack is received from the honeypot. Based on the received information, a subset of honeypots other than the honeypot are configured to entice the attacker to engage with the subset of honeypots or avoid the subset of honeypots.
Status:
Application
Type:
Utility
Filling date:
24 Mar 2021
Issue date:
8 Jul 2021