Rapid7, Inc.
Behavior management of deception system fleets

Last updated:

Abstract:

Disclosed herein are methods, systems, and processes for managing and controlling the collective behavior of deception computing system fleets. A malicious attack initiated by a malicious attacker received by a honeypot that is part of a network along with other honeypots is detected. Information associated with the malicious attack is received from the honeypot. Based on the received information, a subset of honeypots other than the honeypot are configured to entice the attacker to engage with the subset of honeypots or avoid the subset of honeypots.

Status:
Grant
Type:

Utility

Filling date:

28 Mar 2019

Issue date:

15 Jun 2021