Rapid7, Inc.
Behavior management of deception system fleets
Last updated:
Abstract:
Disclosed herein are methods, systems, and processes for managing and controlling the collective behavior of deception computing system fleets. A malicious attack initiated by a malicious attacker received by a honeypot that is part of a network along with other honeypots is detected. Information associated with the malicious attack is received from the honeypot. Based on the received information, a subset of honeypots other than the honeypot are configured to entice the attacker to engage with the subset of honeypots or avoid the subset of honeypots.
Status:
Grant
Type:
Utility
Filling date:
28 Mar 2019
Issue date:
15 Jun 2021