×

Systems and methods for creating a deception computing system

  • US 10,277,629 B1
  • Filed: 12/20/2016
  • Issued: 04/30/2019
  • Est. Priority Date: 12/20/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for creating a deception computing system, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • identifying, by the computing device, a dataset of security alert signatures from a set of client devices;

    determining, by the computing device, a set of software vulnerabilities based on the dataset of security alert signatures;

    clustering, by the computing device, the set of software vulnerabilities to increase a length of at least one potential attack path within a predetermined number of honeypot machines; and

    distributing, by the computing device, a set of vulnerable software among a set of honeypot machines within a honeynet by, for each honeypot machine, assigning a distribution of vulnerable software to the honeypot machine based on a cluster of software vulnerabilities.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×