HoneyLLM: A Large Language Model-Powered Medium-Interaction Honeypot

Wenjun Fan*, Zichen Yang*, Yuanzhen Liu, Lang Qin, Jia Liu

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

Abstract

Honeypot is a sort of deception defense tool and deliberately created for capturing malicious behaviors. The trade-off between security risk and data availability often incurs arduous efforts. Since a high-interaction honeypot (HIH) can capture much deeper system-level data while it has to disclose the full operating system, which absolutely leads to a higher security risk. In contrast, a low-/medium-interaction honeypot (LIH/MIH) revealing empty or camouflaged services has a lower security risk while it can only capture network-level data such as port scanning, access attempts, etc. To tackle this issue, this paper proposes a large language model (LLM) powered medium-interaction honeypot system, termed HoneyLLM, which aims to provide an authentic shell based on LLM rather than a real operating system to spoof the attacker to be fully engaged with the “request-response” message interaction and leave useful data. A proof-of-concept system has been created and deployed for capturing real-world attacks. Our experiments demonstrate that this system outperforms traditional honeypots in effectiveness. HoneyLLM can capture not only network activities as LIH/MIH, but also delve deeper by capturing system activities, like HIH, providing a more complete picture of attacker activity. Despite the limited current exploration of LLMs for authentic response creation for honeypot (at the time of writing, 2024 May 4th), this research signifies a breakthrough in leveraging LLM for more deceptive and dynamic cyber defense mechanisms.

Original languageEnglish
Title of host publicationInformation and Communications Security - 26th International Conference, ICICS 2024, Proceedings
EditorsSokratis Katsikas, Christos Xenakis, Costas Lambrinoudakis, Christos Kalloniatis
PublisherSpringer Science and Business Media Deutschland GmbH
Pages253-272
Number of pages20
ISBN (Print)9789819788002
DOIs
Publication statusPublished - Dec 2024
Event26th International Conference on Information and Communications Security, ICICS 2024 - Mytilene, Greece
Duration: 26 Aug 202428 Aug 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume15057 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference26th International Conference on Information and Communications Security, ICICS 2024
Country/TerritoryGreece
CityMytilene
Period26/08/2428/08/24

Keywords

  • Authentic Response
  • Deception Defdel
  • Fake Shell
  • Honeypot
  • Large Language Model
  • Shell Evaluation

Fingerprint

Dive into the research topics of 'HoneyLLM: A Large Language Model-Powered Medium-Interaction Honeypot'. Together they form a unique fingerprint.

Cite this