Method and system for morphing honeypot with computer security incident correlation
First Claim
1. A method for operating a server, the method comprising:
- emulating a service on a server;
in response to receiving a request at the emulated service, sending a response that comprises information indicating a set of vulnerable characteristics at the server;
obtaining, from a source external to the server, an event notification message concerning an event external to the server, wherein the source is one of;
a network intrusion detection system, an operating system-based intrusion detection system, an application-based intrusion detection system, and a risk management system; and
in response to obtaining the event notification message, and as the service is emulated on the server, automatically reconfiguring the set of vulnerable characteristics according to a vulnerability alteration rule when an operational condition associated with the emulated service, as specified in a rule, is detected.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, system, apparatus, or computer program product is presented for morphing a honeypot system on a dynamic and configurable basis. The morphing honeypot emulates a variety of services while falsely presenting information about potential vulnerabilities within the system that supports the honeypot. The morphing honeypot has the ability to dynamically change its personality or displayed characteristics using a variety of algorithms and a database of known operating system and service vulnerabilities. The morphing honeypot'"'"'s personality can be changed on a timed or scheduled basis, on the basis of activity that is generated by the presented honeypot personality, or on some other basis. The morphing honeypot can also be integrated with intrusion detection systems and other types of computer security incident recognition systems to correlate its personality with detected nefarious activities.
-
Citations
11 Claims
-
1. A method for operating a server, the method comprising:
- emulating a service on a server;
in response to receiving a request at the emulated service, sending a response that comprises information indicating a set of vulnerable characteristics at the server; obtaining, from a source external to the server, an event notification message concerning an event external to the server, wherein the source is one of;
a network intrusion detection system, an operating system-based intrusion detection system, an application-based intrusion detection system, and a risk management system; andin response to obtaining the event notification message, and as the service is emulated on the server, automatically reconfiguring the set of vulnerable characteristics according to a vulnerability alteration rule when an operational condition associated with the emulated service, as specified in a rule, is detected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
- emulating a service on a server;
Specification