On Designing Low-Risk Honeypots Using Generative Pre-Trained Transformer Models With Curated Inputs

Honeypots are utilized as defensive tools within a monitored environment to engage attackers and gather artifacts for the development of indicators of compromise. However, once these honeypots are deployed, they are rarely updated, making them obsolete and easier to fingerprint as time passes. Furth...

وصف كامل

التفاصيل البيبلوغرافية
الحاوية / القاعدة:IEEE Access
المؤلفون الرئيسيون: Jarrod Ragsdale, Rajendra V. Boppana
التنسيق: مقال
اللغة:الإنجليزية
منشور في: IEEE 2023-01-01
الموضوعات:
الوصول للمادة أونلاين:https://ieeexplore.ieee.org/document/10295397/