Rapid7, Inc.
Live deployment of deception systems
Last updated:
Abstract:
Disclosed herein are methods, systems, and processes to perform live deployment of deception computing systems. An imminent or ongoing malicious attack on a protected host in a network is detected. In response to detecting the imminent or ongoing malicious attack, personality characteristics of the protected host are cloned and a honeypot clone based on the personality characteristics is generated. The honeypot clone is then deployed in the network.
Status:
Grant
Type:
Utility
Filling date:
28 Mar 2019
Issue date:
27 Apr 2021