Host-based deception security technology
user-5d4bc4a8530c70a9b361c870(2020)
摘要
Systems and methods for generating and deploying decoy files and decoy applications that appear to be authentic files and applications. The content of the decoy files may be configurable, and the decoy files may be beaconized. The extent to which decoy files are and decoy applications are deployed may depend on the authentication level or change in authentication level of a user.
更多查看译文
关键词
Decoy,Authentication,Host (network),Deception,Computer security,Computer science
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要