Today, SURGe by Splunk is proud to unveil DECEIVE (DECeption with Evaluative Integrated Validation Engine), a proof-of-concept open-source honeypot that demonstrates the potential of using AI to easily create new cybersecurity tools and solutions. While DECEIVE is not a production-grade tool, it illustrates how AI can enable new approaches to cybersecurity problems that might not have been otherwise feasible.
This project was also an experiment for us. We wanted to learn what it would take for security teams to build their own AI-enabled solutions. We designed DECEIVE with this learning process in mind, and we hope it inspires others to explore similar integrations.
Let's talk about what makes DECEIVE special.
Traditional high-interaction honeypots require significant effort to simulate realistic environments: installing operating systems, configuring user accounts, and seeding realistic but fake data all take time and effort. DECEIVE leverages AI to handle all of this dynamically. By simulating an entire Linux server via SSH, DECEIVE provides attackers with an authentic-feeling target without needing a painstaking setup. All you need to do is create a prompt describing the type of system you'd like to simulate. For example:
You are a video game developer's system. Include realistic video game source and asset files.
The AI backend ensures that system interactions feel natural and contextually appropriate, drastically lowering the effort required to deploy a realistic honeypot while maintaining high fidelity.
DECEIVE goes beyond traditional honeypots by using AI to analyze and summarize attacker behavior. When an SSH session completes, DECEIVE automatically generates:
This analysis is captured in structured JSON log files, along with a full record of all the user's commands and their simulated outputs. This helps reduce the manual effort needed to sort through all the sessions to see which are the most interesting from a security perspective.
While this version of DECEIVE focuses on SSH, the approach is adaptable to protocols like HTTP or SMTP. API endpoints would also be good candidates for simulation. This allows for simulating a wide range of environments to understand attacker behaviors across different attack surfaces better. It also enables rapid deployment of new honeypots simulating specific vulnerabilities by updating the AI prompt. This would be useful to security researchers and blue teams trying to understand and respond to the latest vulnerabilities, especially in rapidly-evolving situations where full details of the vulnerability may not yet be known.
DECEIVE isn’t just about fooling attackers—it’s also about understanding what it takes for security teams to integrate AI into their workflows. By building DECEIVE, we explored:
We want to emphasize that DECEIVE is a proof of concept, not a production-grade solution, and certainly not a product supported by Splunk. While it’s a powerful demonstration of what’s possible, we have not extensively tested it for security vulnerabilities. Though the emulated nature of the SSH backend provides a substantial amount of protection against attackers using the honeypot for Evil (there's no real system executing anything and it's not possible to create or accept network connections from the real world), there is always the possibility of flaws in the honeypot code itself. Exercise caution when deploying DECEIVE in a potentially hostile environment.
DECEIVE is open-source and ready for experimentation. Here’s how you can try it:
By default, the system will listen on port 8022/TCP for incoming SSH connections. On a UNIX or Linux system, you can log in with a command like the following:
ssh guest@localhost -p 8022
Note that the config file specifies that the guest account has an empty password, so you won't be prompted to enter one. Set one in the config file if you like.
DECEIVE is an exciting part of our journey into AI-enabled security solutions. By building and sharing this project, we hope to inspire others in the cybersecurity community to explore how AI can address challenges that were previously considered unsolvable or infeasible.
DECEIVE shows that by combining AI with traditional techniques, we can create more intelligent, more adaptable solutions that lower the barrier to entry for deploying advanced deception technologies and developing innovative new security tools powered by AI. Join us in exploring this exciting frontier!
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.