EconPapers    
Economics at your fingertips  
 

Leveraging generative AI for dynamic file honeypots: Insights and implementation

Vladimir Strogov and Sergey Ulasen
Additional contact information
Vladimir Strogov: Acronis, 8 Temasek Boulevard #30-01/02 Suntec Tower 3, Singapore
Sergey Ulasen: Constructor Technology, Singapore

Cyber Security: A Peer-Reviewed Journal, 2025, vol. 8, issue 4, 392-400

Abstract: In the field of cyber security, dynamic file honeypots serve as critical tools for detecting and analysing malicious activities, especially zero-day ransomware attacks. This paper explores the integration of generative AI (GenAI) with file honeypots to enhance their effectiveness. By dynamically generating virtual decoy content, these advanced honeypots deceive attackers and protect real data. The discussion includes technical aspects of implementing file honeypots, focusing on two primary cases: dynamically inserted virtual honeypot files and honeypot files wrapped around real protected files. The paper also outlines the benefits of using GenAI for realistic content generation, continuous adaptation and enhanced threat intelligence. This approach not only bolsters security measures but also reduces storage footprints and improves overall cyber security resilience.

Keywords: leveraging generative AI; dynamic file honeypots; LLM for honeypot generation; malicious thread injection; dynamically inserted virtual honeypot files; advanced file system integration (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/9218/download/ (application/pdf)
https://hstalks.com/article/9218/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2025:v:8:i:4:p:392-400

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-04-26
Handle: RePEc:aza:csj000:y:2025:v:8:i:4:p:392-400