Patent attributes
A network security method utilizing a bespoke honeypot includes first duplicating a protected image of a network accessible application from a primary container in which the protected image executes into a secondary container as a duplicated image. The method further includes modifying data in the duplicated image to different values than corresponding values in the protected image while retaining a same format as the values of the protected image, thereby forming a bespoke honeypot or chimaera. Thereafter, the method includes detecting an attempted intrusion in the protected image of the primary container and, in response to the detection, identifying a network source of the attempted intrusion, routing subsequent requests from the identified network source to the duplicated image in the secondary container and logging interactions between the identified network source and the duplicated image.