International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |
| TITLE | Neurophage Sentinel – Adaptive AI Honeypot System |
|---|---|
| ABSTRACT | Modern organizational security faces unprecedented challenges from sophisticated, adaptive cyberattacks that systematically bypass traditional static defense mechanisms. Conventional honeypots, despite their utility in threat monitoring, are frequently identified and circumvented by experienced adversaries due to their predictable behavioral patterns and static configurations. This research presents "Neurophage Sentinel," an innovative next-generation adaptive honeypot system drawing inspiration from biological immune system responses. The proposed framework integrates machine learning algorithms with a dynamically self-mutating deception environment, continuously modifying services, network ports, and system responses to evade detection. By channeling attackers into a controlled yet constantly evolving simulated environment, Neurophage Sentinel facilitates real-time behavioral pattern analysis and accumulates high-fidelity threat intelligence regarding zero-day vulnerabilities and advanced persistent threats. Experimental validation demonstrates that this framework successfully transitions reactive defense paradigms into intelligent, proactive protection ecosystems capable of learning and adapting to emerging threat landscapes. |
| AUTHOR | ABDUL AZEEZ, ABDUL KADEER, MOHAMMED RAIYYAN, SHILPA D R Student, Dept. of ISE, Jain Institute of Technology, Davangere, Karnataka, India Assistant Professor, Dept. of CSE, Jain Institute of Technology, Davangere, Karnataka, India |
| VOLUME | 180 |
| DOI | DOI: 10.15680/IJIRCCE.2026.1401026 |
| pdf/26_Neurophage Sentinel – Adaptive AI Honeypot System.pdf | |
| KEYWORDS | |
| References | 1. C. Stoll, The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage, New York, NY, USA: Doubleday, 1989. 2. L. Spitzner, Honeypots: Tracking Hackers, Boston, MA, USA: Addison-Wesley, 2003. 3. N. Provos, “A virtual honeypot framework,” in Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA, 2004, pp. 1–14. 4. MITRE ATT&CK, “ATT&CK: Adversarial tactics, techniques, and common knowledge,” MITRE Corporation, McLean, VA, USA, 2023. 5. S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, New York, NY, USA: Springer, 2011. 6. K. Scarfone and P. Mell, “Guide to intrusion detection and prevention systems (IDPS),” NIST Special Publication 800-94, National Institute of Standards and Technology, Gaithersburg, MD, USA, 2007. 7. I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, Cambridge, MA, USA: MIT Press, 2016. 8. M. U. Aksu, T. Alpcan, and S. Rass, “A game-theoretic approach to adaptive security using deception,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 2, pp. 487–501, Feb. 2018. 9. S. Dowling, M. Schukat, and H. Melvin, “Adaptive honeypot data analysis using machine learning,” Journal of Computer Virology and Hacking Techniques, vol. 13, no. 3, pp. 1–12, 2017. 10. R. Sommer and V. Paxson, “Outside the closed world: On using machine learning for network intrusion detection,” in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2010, pp. 305– 316. 11. A. Shabtai, R. Moskovitch, Y. Elovici, and C. Glezer, “Detection of malicious code by applying machine learning classifiers on static features,” Security Informatics, vol. 1, no. 1, pp. 1–22, 2012. 12. F. Cohen, “Computer viruses: Theory and experiments,” Computers & Security, vol. 6, no. 1, pp. 22–35, 1987. 13. H. Almeshekah and E. Spafford, “Planning and integrating deception into computer security defenses,” in Proceedings of the New Security Paradigms Workshop (NSPW), 2014, pp. 1–13. 14. S. Antonatos, K. G. Anagnostakis, and E. P. Markatos, “Generating realistic environments for honeypots,” ACM Workshop on Hot Topics in Networks, 2005. 15. Y. Zeng, M. H. Dacier, and J. Garcia-Alfaro, “Automated attack classification for intrusion response systems,” International Journal of Information Security, vol. 19, no. 2, pp. 145–160, 2020. |