Honeypot asset cloning
Abstract:
Disclosed herein are methods, systems, and processes for performing honeypot asset cloning in cybersecurity computing environments. A computing asset and associated configuration information is identified along with configuration requirements for a honeypot. The configuration is modified to generate replication configuration information based partly on the configuration requirements. The replication configuration information is deployed in the network. A request to manage a configuration deployment in the network is received. In response to the request, the computing asset is configured based on the configuration information and the honeypot is generated based on the replication configuration information. The configuration is normalized and mapping information that is part of the configuration information that is supported by the honeypot is identified. A value in the configuration is replaced with another value associated with the part of the configuration information that is supported by the honeypot.
Public/Granted literature
Information query
Patent Agency Ranking
0/0