主权项 |
1. A device, comprising:
a processor configured to:
generate a first signal using a first communication protocol, wherein the first signal corresponds to data transmitted to the processor using the first communication protocol, wherein the first communication protocol is a protocol utilized to communicate between the processor and at least one node coupled to the processor in a network;generate a second signal using a second communication protocol, wherein the second signal comprises decoy data generated by the processor as part of a network security protocol, wherein the second signal is generated independently from the data transmitted to the processor;transmit the first signal as an actual signal for reception by the at least one node and transmit the second signal as a decoy signal in parallel with one another;detect a transmission using the second communication protocol; andcapture data present in the transmission using the second communication protocol for logging of the captured data to be utilized in the generation of an intrusion detection system (IDS) signature or generation of an intrusion prevention system (IPS) signature. |