ENHANCING CYBERSECURITY WITH AI-DRIVEN DYNAMIC HONEYPOTS

Authors

  • Minal Solanki Assistant Professor, Master Of Computer Application (MCA) Department, RTMNU University K.D.K College of Engineering Nagpur Author
  • Janvi Petkar Assistant Professor, Master Of Computer Application (MCA) Department, RTMNU University K.D.K College of Engineering Nagpur Author
  • Ritika Wanjari Assistant Professor, Master Of Computer Application (MCA) Department, RTMNU University K.D.K College of Engineering Nagpur Author
  • Sanidhi Gajbhiye Assistant Professor, Master Of Computer Application (MCA) Department, RTMNU University K.D.K College of Engineering Nagpur Author
  • Vaibhavi Kalode Assistant Professor, Master Of Computer Application (MCA) Department, RTMNU University K.D.K College of Engineering Nagpur Author

Keywords:

CYBERSECURITY, AI-DRIVEN DYNAMIC

Abstract

Cybersecurity threats have evolved, requiring advanced defense mechanisms to detect and mitigate attacks effectively. Honeypots serve as decoy systems to attract and analyze malicious activities, but traditional honeypots lack adaptability and rely on static rule-based detection. This paper explores the integration of Artificial Intelligence (AI) and Machine Learning (ML) in honeypots to enhance threat detection and dynamic response mechanisms. We compare Traditional Rule-Based Detection, Random Forest, and XGBoost models to classify attacks based on honeypot log data. Additionally, an AI-Driven decision-making layer is implemented to dynamically respond to threats by categorizing attack severity and selecting appropriate countermeasures. Due to a lack of real-world attack data, publicly available honeypot logs from Kaggle were used for training and evaluation. The result demonstrates that XGBoost outperforms other models, achieving higher accuracy and recall in detecting malicious activity. While the current system operates based on predefined AI rules, future enhancements could incorporate real-time adaptive honeypots capable of modifying network defenses dynamically based on attack pattern

Downloads

Download data is not yet available.

References

M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, “A Multifaceted Approach to Understanding the Botnet Phenomenon,” IMC, 2006. Available: https://dl.acm.org/doi/10.1145/1177080.1177105

L. Spitzner, Honeypots: Tracking Hackers, Addison-Wesley, 2002. Available: https://www.tracking-hackers.com/book/

S. N. Mohurle and M. Patil, “A Brief Study of Wannacry Threat: Ransomware Attack 2017,” International Journal of Advanced Research in Computer Science, vol. 8, no. 5, 2017. Available: https://arxiv.org/abs/1706.02769

Kaggle, “Honeypot Attack Logs Dataset,” Available: https://www.kaggle.com/datasets

A. Parmisano, J. Garcia-Alfaro, and M. Herrera, “DionaeaFR: Automatic Extraction of Malware Signatures,” Proceedings of the 10th International Conference on Malicious and Unwanted Software (MALWARE), 2015. Available: https://ieeexplore.ieee.org/document/7413694

California State Polytechnic University, Pomona, “AI-Driven Honeypot System for Detecting Network Attacks,” CyberFair 2024. Available: https://www.cpp.edu/cyberfair/poster-information/documents/2024/2024-ai-driven-honeypot-system-for-detecting-network-attacks%E2%80%8B_design_10.pdf

Downloads

Published

30-03-2025

Issue

Section

Original Research Articles

How to Cite

ENHANCING CYBERSECURITY WITH AI-DRIVEN DYNAMIC HONEYPOTS. (2025). International Journal for Research Publication and Seminar, 16(1), 827-833. https://jrpsjournal.in/index.php/j/article/view/187

Similar Articles

1-10 of 138

You may also start an advanced similarity search for this article.