A method, system, apparatus, or computer program product is presented for
morphing a honeypot system on a dynamic and configurable basis. The
morphing honeypot emulates a variety of services while falsely presenting
information about potential vulnerabilities within the system that
supports the honeypot. The morphing honeypot has the ability to
dynamically change its personality or displayed characteristics using a
variety of algorithms and a database of known operating system and
service vulnerabilities. The morphing honeypot's personality can be
changed on a timed or scheduled basis, on the basis of activity that is
generated by the presented honeypot personality, or on some other basis.
The morphing honeypot can also be integrated with intrusion detection
systems and other types of computer security incident recognition systems
to correlate its personality with detected nefarious activities.