摘要 |
Active computer system defense techniques can include sending disruptive communications to attackers, where the disruptive communications include random data elements which could potentially interfere with the operation of an attacking system. Such computer system defense techniques can also be augmented to automatically optimize the disruptive communications sent to the attackers. |