ENHANCING CYBERSECURITY WITH AI-DRIVEN DYNAMIC HONEYPOTS
Keywords:
CYBERSECURITY, AI-DRIVEN DYNAMICAbstract
Cybersecurity threats have evolved, requiring advanced defense mechanisms to detect and mitigate attacks effectively. Honeypots serve as decoy systems to attract and analyze malicious activities, but traditional honeypots lack adaptability and rely on static rule-based detection. This paper explores the integration of Artificial Intelligence (AI) and Machine Learning (ML) in honeypots to enhance threat detection and dynamic response mechanisms. We compare Traditional Rule-Based Detection, Random Forest, and XGBoost models to classify attacks based on honeypot log data. Additionally, an AI-Driven decision-making layer is implemented to dynamically respond to threats by categorizing attack severity and selecting appropriate countermeasures. Due to a lack of real-world attack data, publicly available honeypot logs from Kaggle were used for training and evaluation. The result demonstrates that XGBoost outperforms other models, achieving higher accuracy and recall in detecting malicious activity. While the current system operates based on predefined AI rules, future enhancements could incorporate real-time adaptive honeypots capable of modifying network defenses dynamically based on attack pattern
Downloads
References
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, “A Multifaceted Approach to Understanding the Botnet Phenomenon,” IMC, 2006. Available: https://dl.acm.org/doi/10.1145/1177080.1177105
L. Spitzner, Honeypots: Tracking Hackers, Addison-Wesley, 2002. Available: https://www.tracking-hackers.com/book/
S. N. Mohurle and M. Patil, “A Brief Study of Wannacry Threat: Ransomware Attack 2017,” International Journal of Advanced Research in Computer Science, vol. 8, no. 5, 2017. Available: https://arxiv.org/abs/1706.02769
Kaggle, “Honeypot Attack Logs Dataset,” Available: https://www.kaggle.com/datasets
A. Parmisano, J. Garcia-Alfaro, and M. Herrera, “DionaeaFR: Automatic Extraction of Malware Signatures,” Proceedings of the 10th International Conference on Malicious and Unwanted Software (MALWARE), 2015. Available: https://ieeexplore.ieee.org/document/7413694
California State Polytechnic University, Pomona, “AI-Driven Honeypot System for Detecting Network Attacks,” CyberFair 2024. Available: https://www.cpp.edu/cyberfair/poster-information/documents/2024/2024-ai-driven-honeypot-system-for-detecting-network-attacks%E2%80%8B_design_10.pdf
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal for Research Publication and Seminar

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.