Claims
- 1. A method for operating a server, the method comprising:
emulating a service on a server; in response to receiving a request at the emulated service, sending a response that comprises information indicating a set of vulnerable characteristics at the server; and automatically altering the set of vulnerable characteristics.
- 2. The method of claim 1 further comprising:
temporally varying the set of vulnerable characteristics.
- 3. The method of claim 1 further comprising:
configuring a database of vulnerable characteristics.
- 4. The method of claim 3 further comprising:
selecting the set of vulnerable characteristics from the database of vulnerable characteristics in accordance with a type of operating system, a type of emulatable service, or a type of vulnerable characteristic.
- 5. The method of claim 3 further comprising:
allowing a user to specify parameter values; and deriving the set of vulnerable characteristics from the database of vulnerable characteristics in accordance with user-specified parameters.
- 6. The method of claim 5 further comprising:
specifying a time-related parameter for varying the set of vulnerable characteristics.
- 7. The method of claim 3 further comprising:
logging activity by the emulated service; and deriving the set of vulnerable characteristics from the database of vulnerable characteristics in accordance with logged activity by the emulated service.
- 8. The method of claim 7 further comprising:
triggering an automatic alteration of the set of vulnerable characteristics in response to logged activity by the emulated service being below a configurable threshold value.
- 9. The method of claim 1 further comprising:
configuring a database of monitoring rules; retrieving a monitoring rule from the database of monitoring rules; monitoring an operational condition of the server in accordance with the monitoring rule; and triggering an automatic alteration of the set of vulnerable characteristics in response to a determination that the monitoring rule is satisfied by the operational condition of the server.
- 10. The method of claim 9 further comprising:
retrieving a vulnerability alteration rule that is associated with the monitoring rule; and deriving the set of vulnerable characteristics from the database of vulnerable characteristics in accordance with the vulnerability alteration rule in response to the triggering of an automatic alteration of the set of vulnerable characteristics.
- 11. The method of claim 10 further comprising:
specifying a parameter for a type of operating system in the vulnerability alteration rule to be used in deriving the set of vulnerable characteristics.
- 12. The method of claim 10 further comprising:
specifying a parameter for a type of service in the vulnerability alteration rule to be used in deriving the set of vulnerable characteristics.
- 13. A data processing system comprising:
means for emulating a service on a server; means for sending a response that comprises information indicating a set of vulnerable characteristics at the server in response to receiving a request at the emulated service; and means for automatically altering the set of vulnerable characteristics.
- 14. The data processing system of claim 13 further comprising:
means for temporally varying the set of vulnerable characteristics.
- 15. The data processing system of claim 13 further comprising:
means for configuring a database of vulnerable characteristics.
- 16. The data processing system of claim 15 further comprising:
means for selecting the set of vulnerable characteristics from the database of vulnerable characteristics in accordance with a type of operating system, a type of emulatable service, or a type of vulnerable characteristic.
- 17. The data processing system of claim 15 further comprising:
means for allowing a user to specify parameter values; and means for deriving the set of vulnerable characteristics from the database of vulnerable characteristics in accordance with user-specified parameters.
- 18. The data processing system of claim 17 further comprising:
means for specifying a time-related parameter for varying the set of vulnerable characteristics.
- 19. The data processing system of claim 17 further comprising:
means for logging activity by the emulated service; and means for deriving the set of vulnerable characteristics from the database of vulnerable characteristics in accordance with logged activity by the emulated service.
- 20. The data processing system of claim 19 further comprising:
means for triggering an automatic alteration of the set of vulnerable characteristics in response to logged activity by the emulated service being below a configurable threshold value.
- 21. The data processing system of claim 13 further comprising:
means for configuring a database of monitoring rules; means for retrieving a monitoring rule from the database of monitoring rules; means for monitoring an operational condition of the server in accordance with the monitoring rule; and means for triggering an automatic alteration of the set of vulnerable characteristics in response to a determination that the monitoring rule is satisfied by the operational condition of the server.
- 22. The data processing system of claim 21 further comprising:
means for retrieving a vulnerability alteration rule that is associated with the monitoring rule; and means for deriving the set of vulnerable characteristics from the database of vulnerable characteristics in accordance with the vulnerability alteration rule in response to the triggering of an automatic alteration of the set of vulnerable characteristics.
- 23. The data processing system of claim 22 further comprising:
means for specifying a parameter for a type of operating system in the vulnerability alteration rule to be used in deriving the set of vulnerable characteristics.
- 24. The data processing system of claim 22 further comprising:
means for specifying a parameter for a type of service in the vulnerability alteration rule to be used in deriving the set of vulnerable characteristics.
- 25. A computer program product in a computer readable medium for use in operating a data processing system, the computer program product comprising:
means for emulating a service on a server; means for sending a response that comprises information indicating a set of vulnerable characteristics at the server in response to receiving a request at the emulated service; and means for automatically altering the set of vulnerable characteristics.
- 26. The computer program product of claim 25 further comprising:
means for temporally varying the set of vulnerable characteristics.
- 27. The computer program product of claim 25 further comprising:
means for configuring a database of vulnerable characteristics.
- 28. The computer program product of claim 27 further comprising:
means for selecting the set of vulnerable characteristics from the database of vulnerable characteristics in accordance with a type of operating system, a type of emulatable service, or a type of vulnerable characteristic.
- 29. The computer program product of claim 27 further comprising:
means for allowing a user to specify parameter values; and means for deriving the set of vulnerable characteristics from the database of vulnerable characteristics in accordance with user-specified parameters.
- 30. The computer program product of claim 29 further comprising:
means for specifying a time-related parameter for varying the set of vulnerable characteristics.
- 31. The computer program product of claim 29 further comprising:
means for logging activity by the emulated service; and means for deriving the set of vulnerable characteristics from the database of vulnerable characteristics in accordance with logged activity by the emulated service.
- 32. The computer program product of claim 31 further comprising:
means for triggering an automatic alteration of the set of vulnerable characteristics in response to logged activity by the emulated service being below a configurable threshold value.
- 33. The computer program product of claim 25 further comprising:
means for configuring a database of monitoring rules; means for retrieving a monitoring rule from the database of monitoring rules; means for monitoring an operational condition of the server in accordance with the monitoring rule; and means for triggering an automatic alteration of the set of vulnerable characteristics in response to a determination that the monitoring rule is satisfied by the operational condition of the server.
- 34. The computer program product of claim 33 further comprising:
means for retrieving a vulnerability alteration rule that is associated with the monitoring rule; and means for deriving the set of vulnerable characteristics from the database of vulnerable characteristics in accordance with the vulnerability alteration rule in response to the triggering of an automatic alteration of the set of vulnerable characteristics.
- 35. The computer program product of claim 34 further comprising:
means for specifying a parameter for a type of operating system in the vulnerability alteration rule to be used in deriving the set of vulnerable characteristics.
- 36. The computer program product of claim 34 further comprising:
means for specifying a parameter for a type of service in the vulnerability alteration rule to be used in deriving the set of vulnerable characteristics.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] The present application is related to the following application with a common assignee:
[0002] U.S. patent application Ser. No. (Attorney Docket Number AUS920020621US1), filed (TBD), titled “Method and System for Morphing Honeypot with Computer Security Incident Correlation”.