Method and system for morphing honeypot with computer security incident correlation
A method, system, apparatus, or computer program product is presented for morphing a honeypot system on a dynamic and configurable basis. The morphing honeypot emulates a variety of services while falsely presenting information about potential vulnerabilities within the system that supports the hone...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | BLAKE KENNETH W CONVERSE VIKKI KIM GARRISON JOHN MICHAEL EDMARK RONALD O?APOS NEAL |
description | A method, system, apparatus, or computer program product is presented for morphing a honeypot system on a dynamic and configurable basis. The morphing honeypot emulates a variety of services while falsely presenting information about potential vulnerabilities within the system that supports the honeypot. The morphing honeypot has the ability to dynamically change its personality or displayed characteristics using a variety of algorithms and a database of known operating system and service vulnerabilities. The morphing honeypot's personality can be changed on a timed or scheduled basis, on the basis of activity that is generated by the presented honeypot personality, or on some other basis. The morphing honeypot can also be integrated with intrusion detection systems and other types of computer security incident recognition systems to correlate its personality with detected nefarious activities. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2004128543A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2004128543A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2004128543A13</originalsourceid><addsrcrecordid>eNqNyj0KAjEQQOE0FqLeYcBa2D_BVkSxsVqtl5DMbgKbmZDMIrm9Fh7A6hXfW6v-geLYgiYLuWTBACMnCJyi8zSBY8ISWeDtxYHhEBfBBBnNkrwU8GS8RZIvpYSzFs-0VatRzxl3v27U_nZ9Xu4HjDxgjtogoQyvvqmqrm5Ox6491-1_1weqQDpV</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Method and system for morphing honeypot with computer security incident correlation</title><source>esp@cenet</source><creator>BLAKE KENNETH W ; CONVERSE VIKKI KIM ; GARRISON JOHN MICHAEL ; EDMARK RONALD O?APOS;NEAL</creator><creatorcontrib>BLAKE KENNETH W ; CONVERSE VIKKI KIM ; GARRISON JOHN MICHAEL ; EDMARK RONALD O?APOS;NEAL</creatorcontrib><description>A method, system, apparatus, or computer program product is presented for morphing a honeypot system on a dynamic and configurable basis. The morphing honeypot emulates a variety of services while falsely presenting information about potential vulnerabilities within the system that supports the honeypot. The morphing honeypot has the ability to dynamically change its personality or displayed characteristics using a variety of algorithms and a database of known operating system and service vulnerabilities. The morphing honeypot's personality can be changed on a timed or scheduled basis, on the basis of activity that is generated by the presented honeypot personality, or on some other basis. The morphing honeypot can also be integrated with intrusion detection systems and other types of computer security incident recognition systems to correlate its personality with detected nefarious activities.</description><edition>7</edition><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2004</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20040701&DB=EPODOC&CC=US&NR=2004128543A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76293</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20040701&DB=EPODOC&CC=US&NR=2004128543A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>BLAKE KENNETH W</creatorcontrib><creatorcontrib>CONVERSE VIKKI KIM</creatorcontrib><creatorcontrib>GARRISON JOHN MICHAEL</creatorcontrib><creatorcontrib>EDMARK RONALD O?APOS;NEAL</creatorcontrib><title>Method and system for morphing honeypot with computer security incident correlation</title><description>A method, system, apparatus, or computer program product is presented for morphing a honeypot system on a dynamic and configurable basis. The morphing honeypot emulates a variety of services while falsely presenting information about potential vulnerabilities within the system that supports the honeypot. The morphing honeypot has the ability to dynamically change its personality or displayed characteristics using a variety of algorithms and a database of known operating system and service vulnerabilities. The morphing honeypot's personality can be changed on a timed or scheduled basis, on the basis of activity that is generated by the presented honeypot personality, or on some other basis. The morphing honeypot can also be integrated with intrusion detection systems and other types of computer security incident recognition systems to correlate its personality with detected nefarious activities.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2004</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyj0KAjEQQOE0FqLeYcBa2D_BVkSxsVqtl5DMbgKbmZDMIrm9Fh7A6hXfW6v-geLYgiYLuWTBACMnCJyi8zSBY8ISWeDtxYHhEBfBBBnNkrwU8GS8RZIvpYSzFs-0VatRzxl3v27U_nZ9Xu4HjDxgjtogoQyvvqmqrm5Ox6491-1_1weqQDpV</recordid><startdate>20040701</startdate><enddate>20040701</enddate><creator>BLAKE KENNETH W</creator><creator>CONVERSE VIKKI KIM</creator><creator>GARRISON JOHN MICHAEL</creator><creator>EDMARK RONALD O?APOS;NEAL</creator><scope>EVB</scope></search><sort><creationdate>20040701</creationdate><title>Method and system for morphing honeypot with computer security incident correlation</title><author>BLAKE KENNETH W ; CONVERSE VIKKI KIM ; GARRISON JOHN MICHAEL ; EDMARK RONALD O?APOS;NEAL</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2004128543A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2004</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>BLAKE KENNETH W</creatorcontrib><creatorcontrib>CONVERSE VIKKI KIM</creatorcontrib><creatorcontrib>GARRISON JOHN MICHAEL</creatorcontrib><creatorcontrib>EDMARK RONALD O?APOS;NEAL</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>BLAKE KENNETH W</au><au>CONVERSE VIKKI KIM</au><au>GARRISON JOHN MICHAEL</au><au>EDMARK RONALD O?APOS;NEAL</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Method and system for morphing honeypot with computer security incident correlation</title><date>2004-07-01</date><risdate>2004</risdate><abstract>A method, system, apparatus, or computer program product is presented for morphing a honeypot system on a dynamic and configurable basis. The morphing honeypot emulates a variety of services while falsely presenting information about potential vulnerabilities within the system that supports the honeypot. The morphing honeypot has the ability to dynamically change its personality or displayed characteristics using a variety of algorithms and a database of known operating system and service vulnerabilities. The morphing honeypot's personality can be changed on a timed or scheduled basis, on the basis of activity that is generated by the presented honeypot personality, or on some other basis. The morphing honeypot can also be integrated with intrusion detection systems and other types of computer security incident recognition systems to correlate its personality with detected nefarious activities.</abstract><edition>7</edition><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2004128543A1 |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Method and system for morphing honeypot with computer security incident correlation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T12%3A29%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=BLAKE%20KENNETH%20W&rft.date=2004-07-01&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2004128543A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |