Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.12 Issue.2

Submission
Last date
28-Apr-2026
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-12,Issue-2. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  Generative models for creating honeypot system to lure cyber attackers
PaperId: :  27416
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 11 Issue 4 2025
DUI:    16.0415/IJARIIE-27416
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
SHRUSHTI K NT JOHN INSTITUTION OF TECHNOLOGY
M SELVAM T JOHN INSTITUTION OF TECHNOLOGY

Abstract

cyber security
Generative Adversarial Networks (GANs) can be employed to create realistic decoy network traffic that mimics legitimate user behavior to attract cyber attackers. Variational Autoencoders (VAEs) are useful for generating synthetic system logs that simulate typical user activity and hide deceptive elements. Large Language Models (LLMs) such as GPT can be used to dynamically generate realistic command-line responses or fake service banners to engage attackers. Deep generative models enable the creation of high-fidelity honeypot environments that closely resemble real systems in both behavior and appearance. Synthetic data generation techniques allow the creation of fake user credentials, file systems, and communication patterns to enhance the believability of the honeypot. AI-generated network protocols can simulate legitimate service communications, helping lure attackers into interacting with the decoy system.
Threats to information security, such as malware, are constantly evolving. The number of malware cases reported increased by over six million in 2014. The amount of Trojan Horse malware is highest, while the increase in Adware malware is most noticeable. It is believed that security system equipment such as firewalls, antivirus software, and Asa signature- based security systems cannot identify malware. This happens because computer malware is becoming more and more prevalent and because the number of signatures is always increasing. Without signature-based security measures, it is difficult to detect new tactics, viruses, or worms used by attackers. Another alternative for malware detection is to use machine learning in combination with honeypots. Honeypots can be used to catch suspicious packages, while machine learning can identify spyware by classifying it. Support The classification algorithms used are Support Vector Machines ( SVM) and Decision Trees, respectively. As a means of malware detection, we propose utilizing design elements in this study. We offered the design suggestion and detailed the experimental technique to be used. Threats to information security, such as malware, are constantly evolving. In 2014, there were about six million new instances of malware reported. The amount of Trojan Horse malware is highest, while the increase in Adware malware is most noticeable. It is often believed that security system devices focused on antivirus signatures, routers, and intrusion detection systems cannot identify malware. This happens because computer malware is becoming more and more prevalent and because the number of signatures is always increasing. Without signature-based security measures, it is difficult to detect new tactics, viruses, or worms used by attackers. Another alternative for malware detection is to use machine learning in combination with honeypots. Honeypots can be used to catch suspicious packages, while machine learning can identify viruses by classifying it. We use Decision Trees and Support Vector Machines (SVMs) for classification. As a means of malware detection, we propose utilizing design elements in this study. In addition to providing the architectural plan, we detailed the experimental technique that will be used.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE SHRUSHTI K N, and M SELVAM . "Generative models for creating honeypot system to lure cyber attackers" International Journal Of Advance Research And Innovative Ideas In Education Volume 11 Issue 4 2025 Page 4039-4046
MLA SHRUSHTI K N, and M SELVAM . "Generative models for creating honeypot system to lure cyber attackers." International Journal Of Advance Research And Innovative Ideas In Education 11.4(2025) : 4039-4046.
APA SHRUSHTI K N, & M SELVAM . (2025). Generative models for creating honeypot system to lure cyber attackers. International Journal Of Advance Research And Innovative Ideas In Education, 11(4), 4039-4046.
Chicago SHRUSHTI K N, and M SELVAM . "Generative models for creating honeypot system to lure cyber attackers." International Journal Of Advance Research And Innovative Ideas In Education 11, no. 4 (2025) : 4039-4046.
Oxford SHRUSHTI K N, and M SELVAM . 'Generative models for creating honeypot system to lure cyber attackers', International Journal Of Advance Research And Innovative Ideas In Education, vol. 11, no. 4, 2025, p. 4039-4046. Available from IJARIIE, https://ijariie.com/AdminUploadPdf/Generative_models_for_creating_honeypot_system_to_lure_cyber_attackers_ijariie27416.pdf (Accessed : ).
Harvard SHRUSHTI K N, and M SELVAM . (2025) 'Generative models for creating honeypot system to lure cyber attackers', International Journal Of Advance Research And Innovative Ideas In Education, 11(4), pp. 4039-4046IJARIIE [Online]. Available at: https://ijariie.com/AdminUploadPdf/Generative_models_for_creating_honeypot_system_to_lure_cyber_attackers_ijariie27416.pdf (Accessed : )
IEEE SHRUSHTI K N, and M SELVAM , "Generative models for creating honeypot system to lure cyber attackers," International Journal Of Advance Research And Innovative Ideas In Education, vol. 11, no. 4, pp. 4039-4046, Jul-Aug 2025. [Online]. Available: https://ijariie.com/AdminUploadPdf/Generative_models_for_creating_honeypot_system_to_lure_cyber_attackers_ijariie27416.pdf [Accessed : ].
Turabian SHRUSHTI K N, and M SELVAM . "Generative models for creating honeypot system to lure cyber attackers." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 11 number 4 ().
Vancouver SHRUSHTI K N, and M SELVAM . Generative models for creating honeypot system to lure cyber attackers. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2025 [Cited : ]; 11(4) : 4039-4046. Available from: https://ijariie.com/AdminUploadPdf/Generative_models_for_creating_honeypot_system_to_lure_cyber_attackers_ijariie27416.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads



Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
Role of AI in Drug FormulationscienceApeksha Harpal Download
ROLE OF AI IN COMMUNITY PHARMACYPharmacySONAL JAIN Download
Controls of Syntectonic Sedimentation on Vergent Thrust Wedge Development: Insights from the Sichuan Basinoil and gas engineeringAHMED KHALID Download
Sonargaon's Study on the Empowerment of Culture Heritage and Rural TourismGeographyMD Shafiqul Islam Download
Vinca Roseus: An Extensive Review focused on Recent StudiesPharmacyMs. Rutuja Gawade Download
FACEBOOK AS A DIGITAL LEARNING PLATFORM: ITS EFFECTIVENESS IN ENHANCING STATISTICS AND PROBABILITY PROFICIENCYMathematics EducationChelsea Mae B. Brofar, PhD Download
Generative models for creating honeypot system to lure cyber attackerscyber securitySHRUSHTI K N Download
A REVIEW ON FORMULATE AND EVALUATE HAND SANITIZER CONTAINING COW URINE (GOMUTRA) AS MAIN INGREDIENTPharmacy Pawar Poonam Download
BARRIER DISTRIBUTIONS FOR THE FUSION OF 120Sn WITH 16O USING 3S-CMD MODELHigh Energy PhysicsJignasha Patel Download
HANDWRITING ANALYSIS AS A FORENSIC TOOL FOR ESTIMATING AGE, GENDER, AND LITERACY LEVELForensic science VARNIKHAASHREE SG Download
Women Safety Device and Application - ShaktiElectronics and TelecommunicationPayal Yadav Download
IOT BASED WATER POLLUTION MONITORING SYSTEM FOR REAL TIME APPLICATIONS USING CLOUDElectronics and Telecommunication EngineeringSarika Shantaram Mare Download
Exploring the Effectiveness of a Gameboard in Enhancing Understanding of the Digestive SystemEducational Science: BiologyAbigael Quezada Tanza Download
Injection péridurale accidentelle de Syntocinon: case réportAnésthesie et réanimation Sidi Aly Mohamed Lemine Download
Boosting Science Learning through Individualized Interactive Weather Work BookletsScience EducationJezyl A. Teves Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2026. IJARIIE. All Rights Reserved.