Persons
Ing. Muris Sladić
All publications
LLM in the Shell: Generative Honeypots
- Authors: Ing. Muris Sladić, Ing. Veronica Valeros, Catania, C., Ing. Sebastián García, Ph.D.,
- Publication: Proceedings - 9th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2024. Cannes: IEEE Computer Society, 2024. p. 430-435. ISSN 2768-0657. ISBN 979-8-3503-6729-4.
- Year: 2024
- DOI: 10.1109/EuroSPW61312.2024.00054
- Link: https://doi.org/10.1109/EuroSPW61312.2024.00054
- Department: Department of Computer Science, Artificial Intelligence Center
-
Annotation:
Honeypots are essential tools in cybersecurity for early detection, threat intelligence gathering, and analysis of attacker's behavior. However, most of them lack the required realism to engage and fool human attackers long-term. Being easy to distinguish honeypots strongly hinders their effectiveness. This can happen because they are too deterministic, lack adaptability, or lack deepness. This work introduces shelLM, a dynamic and realistic software honeypot based on Large Language Models that generates Linux-like shell output. We designed and implemented shelLM using cloud-based LLMs. We evaluated if shelLM can generate output as expected from a real Linux shell. The evaluation was done by asking cybersecurity researchers to use the honeypot and give feedback if each answer from the honeypot was the expected one from a Linux shell. Results indicate that shelLM can create credible and dynamic answers capable of addressing the limitations of current honeypots. ShelLM reached a TNR of 0.90, convincing humans it was consistent with a real Linux shell. The source code and prompts for replicating the experiments have been publicly available.