主权项 |
1. A method comprising:
a. loading, into a non-volatile computer readable medium of a computer system:
i. a plurality of data element libraries, andii. a disruptive communication template, the disruptive communication template comprising one or more placeholder data entries, each of the placeholder data entries identifying a corresponding data element library from the plurality of data element libraries; b. in response to a reception of a malicious communication by the computer system, determining a disruptive communication to send to an attacker by performing a set of acts comprising, for each placeholder data entry in the disruptive communication template, adding a data element from the corresponding data element library to the disruptive communication; c. sending the disruptive communication to the attacker; and d. determining whether the disruptive communication interferes with an operation pattern of the attacker.
|