2023
DOI: 10.1109/access.2023.3326104
|View full text |Cite
|
Sign up to set email alerts
|

On Designing Low-Risk Honeypots Using Generative Pre-Trained Transformer Models With Curated Inputs

Jarrod Ragsdale,
Rajendra V. Boppana

Abstract: Honeypots are utilized as defensive tools within a monitored environment to engage attackers and gather artifacts for the development of indicators of compromise. However, once these honeypots are deployed, they are rarely updated, making them obsolete and easier to fingerprint as time passes. Furthermore, using fully functional computing and networking devices as honeypots presents the risk of an attacker breaking out from the controlled environment. Large-scale text-generating models, commonly referred to as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
references
References 28 publications
0
0
0
Order By: Relevance