Host-based deception security technology

user-5d4bc4a8530c70a9b361c870(2020)

引用 1|浏览20
暂无评分
摘要
Systems and methods for generating and deploying decoy files and decoy applications that appear to be authentic files and applications. The content of the decoy files may be configurable, and the decoy files may be beaconized. The extent to which decoy files are and decoy applications are deployed may depend on the authentication level or change in authentication level of a user.
更多
查看译文
关键词
Decoy,Authentication,Host (network),Deception,Computer security,Computer science
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要