Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 159 tok/s
Gemini 2.5 Pro 52 tok/s Pro
GPT-5 Medium 36 tok/s Pro
GPT-5 High 24 tok/s Pro
GPT-4o 22 tok/s Pro
Kimi K2 200 tok/s Pro
GPT OSS 120B 447 tok/s Pro
Claude Sonnet 4.5 38 tok/s Pro
2000 character limit reached

AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices (2303.12367v1)

Published 22 Mar 2023 in cs.CR, cs.LG, and math.OC

Abstract: The proliferation of the Internet of Things (IoT) has raised concerns about the security of connected devices. There is a need to develop suitable and cost-efficient methods to identify vulnerabilities in IoT devices in order to address them before attackers seize opportunities to compromise them. The deception technique is a prominent approach to improving the security posture of IoT systems. Honeypot is a popular deception technique that mimics interaction in real fashion and encourages unauthorised users (attackers) to launch attacks. Due to the large number and the heterogeneity of IoT devices, manually crafting the low and high-interaction honeypots is not affordable. This has forced researchers to seek innovative ways to build honeypots for IoT devices. In this paper, we propose a honeypot for IoT devices that uses machine learning techniques to learn and interact with attackers automatically. The evaluation of the proposed model indicates that our system can improve the session length with attackers and capture more attacks on the IoT network.

Citations (5)

Summary

  • The paper introduces AIIPot which leverages transformer-based models and reinforcement learning to dynamically interact with attackers in IoT environments.
  • Its honey-chatbot uses a fine-tuned BERT model and a Markov Decision Process to simulate realistic device behavior, extending session lengths and capturing a diverse range of exploits.
  • Evaluation results showed AIIPot engaged 987 IP addresses over 20 days and captured 6,235 distinct requests, demonstrating its enhanced ability to collect rich attacker data.

AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices

Introduction

The proliferation of IoT devices presents substantial security challenges due to their connectivity and inherent vulnerabilities, such as weak-password protections and vendor-dependent security flaws. Traditional IoT defense mechanisms, such as honeypots, have limitations due to their static interactions and high maintenance costs when dealing with the vast heterogeneity of IoT devices. This paper introduces AIIPot, an intelligent-interaction honeypot leveraging machine learning, specifically transformer models and reinforcement learning, to dynamically interact with attackers, capturing exploits effectively through adaptive engagement.

AIIPot Framework

AIIPot consists of three primary components: the honey-chatbot, req/res database, and request evaluator. The core innovation lies within the honey-chatbot, which employs a transformer-based architecture (BERT) and a Markov Decision Process (MDP) to predict and optimize response strategies. It's designed to emulate intelligent device behavior by adapting its interactions based on attacker engagement, thereby increasing the likelihood of eliciting substantial exploit attempts. Figure 1

Figure 1: High-level overview of AIIPot, showing its components and interaction flow.

Honey-Chatbot and Model Formulation

The honey-chatbot dynamically determines the most expected response to an attacker's request via a BERT model, pre-trained on a dataset of potential interactions. Subsequently, an MDP leverages these predictions to model the potential future conversation with the attacker, using a reward-based system to incentivize prolonged interactions that may culminate in revealing exploit tactics.

The BERT model is fine-tuned to distinguish valid responses to incoming requests, supporting diverse IoT dialogue simulations. The MDP further refines interactions by quantifying state transitions based on past engagements, optimizing responses to align with attacker expectations.

Req/Res Database and Request Evaluation

The req/res database facilitates AIIPot's adaptability, cataloguing request-response pairs to enable swift response generation. Unrecognized requests are processed through a request evaluator, using an SVM classifier to distinguish between benign and untrusted requests. This ensures that only safe interactions contribute to the learning database, continuously enriching AIIPot’s capability to simulate realistic IoT environments. Figure 2

Figure 2: Req/res database entries, illustrating how request-response pairs are stored for reference.

Evaluation and Results

AIIPot was evaluated based on session interaction lengths, information volume exchanged, and captured exploit variety, juxtaposed against existing honeypot solutions. The results demonstrated AIIPot's superior ability to sustain interactions, reflected in a 987 IP-address engagement over 20 days, capturing 6,235 distinct requests. Notably, AIIPot significantly extended interaction lengths, thereby increasing the likelihood of capturing complex exploit attempts. Figure 3

Figure 3: Session length comparison with attackers between honeypots, indicating AIIPot’s enhanced deception performance.

The volume of information collected per session also heightened, indicating richer data acquisition from attackers, pivotal for understanding and defending against evolving IoT threats. Figure 4

Figure 4: Volume of information that the honeypot receives per session length, illustrating the increase in attacker engagement data.

Conclusion

AIIPot represents a notable advancement in honeypot technology, leveraging machine learning to dynamically adapt IoT defenses to the ever-changing tactics of cyber attackers. By increasing interaction lengths and capturing a broader spectrum of attacks, AIIPot not only advances the state of honeypot design but also provides a framework for future development in intelligent security mechanisms for IoT networks. Future research will contemplate refining real-time model convergence and exploring resilience against model poisoning to enhance robustness in diverse deployment scenarios.

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.