TY - GEN
T1 - HoneyLLM: A Large Language Model-Powered Medium-Interaction Honeypot
AU - Fan, Wenjun
AU - Yang, Zichen
AU - Liu, Yuanzhen
AU - Qin, Lang
AU - Liu, Jia
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.
PY - 2024/12
Y1 - 2024/12
N2 - Honeypot is a sort of deception defense tool and deliberately created for capturing malicious behaviors. The trade-off between security risk and data availability often incurs arduous efforts. Since a high-interaction honeypot (HIH) can capture much deeper system-level data while it has to disclose the full operating system, which absolutely leads to a higher security risk. In contrast, a low-/medium-interaction honeypot (LIH/MIH) revealing empty or camouflaged services has a lower security risk while it can only capture network-level data such as port scanning, access attempts, etc. To tackle this issue, this paper proposes a large language model (LLM) powered medium-interaction honeypot system, termed HoneyLLM, which aims to provide an authentic shell based on LLM rather than a real operating system to spoof the attacker to be fully engaged with the “request-response” message interaction and leave useful data. A proof-of-concept system has been created and deployed for capturing real-world attacks. Our experiments demonstrate that this system outperforms traditional honeypots in effectiveness. HoneyLLM can capture not only network activities as LIH/MIH, but also delve deeper by capturing system activities, like HIH, providing a more complete picture of attacker activity. Despite the limited current exploration of LLMs for authentic response creation for honeypot (at the time of writing, 2024 May 4th), this research signifies a breakthrough in leveraging LLM for more deceptive and dynamic cyber defense mechanisms.
AB - Honeypot is a sort of deception defense tool and deliberately created for capturing malicious behaviors. The trade-off between security risk and data availability often incurs arduous efforts. Since a high-interaction honeypot (HIH) can capture much deeper system-level data while it has to disclose the full operating system, which absolutely leads to a higher security risk. In contrast, a low-/medium-interaction honeypot (LIH/MIH) revealing empty or camouflaged services has a lower security risk while it can only capture network-level data such as port scanning, access attempts, etc. To tackle this issue, this paper proposes a large language model (LLM) powered medium-interaction honeypot system, termed HoneyLLM, which aims to provide an authentic shell based on LLM rather than a real operating system to spoof the attacker to be fully engaged with the “request-response” message interaction and leave useful data. A proof-of-concept system has been created and deployed for capturing real-world attacks. Our experiments demonstrate that this system outperforms traditional honeypots in effectiveness. HoneyLLM can capture not only network activities as LIH/MIH, but also delve deeper by capturing system activities, like HIH, providing a more complete picture of attacker activity. Despite the limited current exploration of LLMs for authentic response creation for honeypot (at the time of writing, 2024 May 4th), this research signifies a breakthrough in leveraging LLM for more deceptive and dynamic cyber defense mechanisms.
KW - Authentic Response
KW - Deception Defdel
KW - Fake Shell
KW - Honeypot
KW - Large Language Model
KW - Shell Evaluation
UR - http://www.scopus.com/inward/record.url?scp=85215273964&partnerID=8YFLogxK
U2 - 10.1007/978-981-97-8801-9_13
DO - 10.1007/978-981-97-8801-9_13
M3 - Conference Proceeding
AN - SCOPUS:85215273964
SN - 9789819788002
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 253
EP - 272
BT - Information and Communications Security - 26th International Conference, ICICS 2024, Proceedings
A2 - Katsikas, Sokratis
A2 - Xenakis, Christos
A2 - Lambrinoudakis, Costas
A2 - Kalloniatis, Christos
PB - Springer Science and Business Media Deutschland GmbH
T2 - 26th International Conference on Information and Communications Security, ICICS 2024
Y2 - 26 August 2024 through 28 August 2024
ER -