首页>
外国专利>
DECEPTION-BASED RESPONSES TO SECURITY ATTACKS
DECEPTION-BASED RESPONSES TO SECURITY ATTACKS
展开▼
机译:对安全攻击的基于欺骗的响应
展开▼
页面导航
摘要
著录项
相似文献
摘要
Deception-based techniques for responding to security attacks are described herein. The techniques include transitioning a security attack to a monitored computing device posing as a computing device impacted by the security attack and enabling the adversary to obtain deceptive information from the monitored computing device. Also, the adversary may obtain a document configured to report identifying information of an entity opening the document, thereby identifying the adversary associated with the attack. Further, the techniques include determining that a domain specified in a domain name request is associated with malicious activity and responding to the request with a network address of a monitored computing device to cause the requesting process to communicate with the monitored computing device in place of an adversary server. Additionally, a service may monitor dormant domains names associated with malicious activity and, in response to a change, respond with an alert or a configuration update.
展开▼