LLMHoney: A Real-Time SSH Honeypot with Large Language Model-Driven Dynamic Response Generation
By: Pranjay Malhotra
Potential Business Impact:
Tricks hackers with smart computer answers.
Cybersecurity honeypots are deception tools for engaging attackers and gather intelligence, but traditional low or medium-interaction honeypots often rely on static, pre-scripted interactions that can be easily identified by skilled adversaries. This Report presents LLMHoney, an SSH honeypot that leverages Large Language Models (LLMs) to generate realistic, dynamic command outputs in real time. LLMHoney integrates a dictionary-based virtual file system to handle common commands with low latency while using LLMs for novel inputs, achieving a balance between authenticity and performance. We implemented LLMHoney using open-source LLMs and evaluated it on a testbed with 138 representative Linux commands. We report comprehensive metrics including accuracy (exact-match, Cosine Similarity, Jaro-Winkler Similarity, Levenshtein Similarity and BLEU score), response latency and memory overhead. We evaluate LLMHoney using multiple LLM backends ranging from 0.36B to 3.8B parameters, including both open-source models and a proprietary model(Gemini). Our experiments compare 13 different LLM variants; results show that Gemini-2.0 and moderately-sized models Qwen2.5:1.5B and Phi3:3.8B provide the most reliable and accurate responses, with mean latencies around 3 seconds, whereas smaller models often produce incorrect or out-of-character outputs. We also discuss how LLM integration improves honeypot realism and adaptability compared to traditional honeypots, as well as challenges such as occasional hallucinated outputs and increased resource usage. Our findings demonstrate that LLM-driven honeypots are a promising approach to enhance attacker engagement and collect richer threat intelligence.
Similar Papers
VelLMes: A high-interaction AI-based deception framework
Cryptography and Security
AI fakes computer systems to trick hackers.
Design and Development of an Intelligent LLM-based LDAP Honeypot
Cryptography and Security
Makes fake computer systems trick hackers.
Active Honeypot Guardrail System: Probing and Confirming Multi-Turn LLM Jailbreaks
Cryptography and Security
Stops bad computer instructions by tricking them.