On Designing Low-Risk Honeypots Using Generative Pre-Trained Transformer Models With Curated Inputs

Honeypots are utilized as defensive tools within a monitored environment to engage attackers and gather artifacts for the development of indicators of compromise. However, once these honeypots are deployed, they are rarely updated, making them obsolete and easier to fingerprint as time passes. Furth...

Full description

Bibliographic Details
Main Authors: Jarrod Ragsdale, Rajendra V. Boppana
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10295397/