Rapid7, Inc.
Live deployment of deception systems

Last updated:

Abstract:

Disclosed herein are methods, systems, and processes to perform live deployment of deception computing systems. An imminent or ongoing malicious attack on a protected host in a network is detected. In response to detecting the imminent or ongoing malicious attack, personality characteristics of the protected host are cloned and a honeypot clone based on the personality characteristics is generated. The honeypot clone is then deployed in the network.

Status:
Grant
Type:

Utility

Filling date:

28 Mar 2019

Issue date:

27 Apr 2021