Chatbots in a Honeypot World

01/10/2023
by   Forrest McKee, et al.
0

Question-and-answer agents like ChatGPT offer a novel tool for use as a potential honeypot interface in cyber security. By imitating Linux, Mac, and Windows terminal commands and providing an interface for TeamViewer, nmap, and ping, it is possible to create a dynamic environment that can adapt to the actions of attackers and provide insight into their tactics, techniques, and procedures (TTPs). The paper illustrates ten diverse tasks that a conversational agent or large language model might answer appropriately to the effects of command-line attacker. The original result features feasibility studies for ten model tasks meant for defensive teams to mimic expected honeypot interfaces with minimal risks. Ultimately, the usefulness outside of forensic activities stems from whether the dynamic honeypot can extend the time-to-conquer or otherwise delay attacker timelines short of reaching key network assets like databases or confidential information. While ongoing maintenance and monitoring may be required, ChatGPT's ability to detect and deflect malicious activity makes it a valuable option for organizations seeking to enhance their cyber security posture. Future work will focus on cybersecurity layers, including perimeter security, host virus detection, and data security.

READ FULL TEXT

page 3

page 11

page 12

page 13

page 14

page 15

page 19

page 20

research
01/14/2022

Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots

Cyber Security is a critical topic for organizations with IT/OT networks...
research
07/25/2022

Developing Optimal Causal Cyber-Defence Agents via Cyber Security Simulation

In this paper we explore cyber security defence, through the unification...
research
07/18/2020

Active Deception using Factored Interactive POMDPs to Recognize Cyber Attacker's Intent

This paper presents an intelligent and adaptive agent that employs decep...
research
02/07/2023

Catch Me If You Can: Improving Adversaries in Cyber-Security With Q-Learning Algorithms

The ongoing rise in cyberattacks and the lack of skilled professionals i...
research
12/30/2022

An Analysis of Honeypots and their Impact as a Cyber Deception Tactic

This paper explores deploying a cyber honeypot system to learn how cyber...
research
12/02/2021

A tool to support the investigation and visualization of cyber and/or physical incidents

Investigating efficiently the data collected from a system's activity ca...
research
11/23/2021

Realistic simulation of users for IT systems in cyber ranges

Generating user activity is a key capability for both evaluating securit...

Please sign up or login with your details

Forgot password? Click here to reset