dahn: Deceptively Adaptive Honey Net

dahn – Deceptively Adaptive Honey Net

Traditional honey nets offer static infrastructure and static responses. In DAHN, the infrastructure is abstracted, with lambda/gpt API (prompts stipulated) returning seemingly native responses to the threat actor, depending on the complexity index defined by the administrator. In other words, responses are dynamically crafted to entrap and retain threat actors, internal and external, in this environment for as long as possible, giving them a balance of false hope and realistic obstacles as they pass through our simulated layers of defense. Our AI-powered honey net mimics a given corporate environment to create a fictitious digital twin and embeds a controlled-level of simulated vulnerabilities/weaknesses to attract, distract, learn from, and attribute threat actors. The outputs are decoys, diversion, fingerprints, IoCs and IoAs, attributes, TTPs, and behaviors, and used to augment threat detection and cyber defense strategies.


The tool comes with 3 main components:

  1. The detection fingerprinter analyzes traffic and matches it with malicious fingerprints to decide which traffic to route to the honeynet.
  2. The honeynet leverages AI/LLM to simulate cli-responses from a fleet of machines that resembles the corporate environment. A series of networked machines are lined up virtually to contain the adversary and distract the adversary from the real targets. An attack-path-mapper presents a visual on the progress and current stage at which the adversary is, which the blue team can monitor live.
  3. The intel component collects TTPs, behaviors, and fingerprints from the observed adversaries and converts them into internal intel for actions. There’s also a blue team module that can adaptively influence the adversaries’ movements. For instance, if the blue team wants to see TTPs and IoAs relating to databases, this module releases prompts to simulate vulnerable database instances to steer and lure the attacker into attempting to exploit. The intel module would then capture the on-demand and related behavioral attributes.



Adaptive Honey Net


webshell preview

In the demo below, the adversary has been redirected to our honey net based on the matched fingerprints that are associated with malicious behaviors. Once in, the adversary would discover different honey services. In this scenario, the adversary finds a web shell and interacts with it, performing enumeration and lateral movement activities. On the right, we see a preview of the logged commands, which would be correlated with the output of GPT and used for internal intel, as well as the blue team Attack-Path UI.


Copyright (C) 2024 geo-chen