Looking for feedback on a student project about honeypots & attack analysis
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读用户提供的文章内容。这篇文章是关于一个网络安全学生的开源项目,他们正在寻求业内人士的反馈。 文章提到他们的项目是针对资源有限的小团队,使用蜜罐来观察和分析网络攻击。现有的解决方案存在配置困难、难以定制、工具分散、依赖云以及分析复杂等问题。他们的目标是开发一个轻量级、本地化的工具,整合所有功能,简化蜜罐的使用。 具体功能包括部署经典蜜罐和AI蜜罐,简化配置,允许用户选择蜜罐类型,复用配置,自动收集日志并进行数据规范化,在内部SIEM界面进行分析和可视化。目标用户是小型SOC团队、蓝队或研究组。 接下来的问题部分询问读者是否使用蜜罐,工具是否对他们有用,当前最大的困难以及最重要的功能。 总结时需要涵盖项目的目标、解决的问题、主要功能以及目标用户。同时要保持简洁,在100字以内。 现在组织语言:学生团队开发开源工具,帮助小团队使用蜜罐分析攻击;现有工具的问题;他们的解决方案包括部署经典和AI蜜罐、简化配置、数据收集与分析;目标用户为小型团队;寻求反馈。 确保语言流畅且信息完整。 </think> 学生团队开发开源工具帮助小团队使用蜜罐分析攻击;现有工具存在配置复杂、分散等问题;解决方案包括部署经典和AI蜜罐、简化配置与数据分析;目标用户为小型SOC团队;寻求反馈以优化设计。 2026-1-26 17:8:46 Author: www.reddit.com(查看原文) 阅读量:0 收藏

Hi everyone,

I'm currently working on a cybersecurity student project with my team, and we're trying to get feedback from people who actually work in the field.

Our project is fully open source, and it focuses on helping small security or research teams with limited resources better observe and analyze cyberattacks using honeypots.
(Note: the project is not developed yet — this is an early-stage survey to gather feedback before we start building.)

We noticed that many existing solutions are:

  • hard to configure,

  • difficult to customize,

  • fragmented across multiple tools,

  • cloud-dependent,

  • or complicated to analyze in practice.

So our goal is to build a lightweight, local tool that centralizes everything and makes honeypots easier to use in real conditions.

Concretely, our tool aims to:

  • easily deploy classic honeypots (currently based on Cowrie),

  • deploy an AI-based honeypot developed by us using an open-source local language model,

  • simplify configuration and customization,

  • allow users to choose between classic or AI honeypots,

  • reuse and share configurations across machines,

  • automatically collect all attacker interactions and logs,

  • normalize the data,

  • and display everything in an internal SIEM-like monitoring interface for analysis and visualization.

The main target is small SOC teams, blue teams, or research groups that don't necessarily have the time or resources to assemble and maintain complex toolchains.

Before going further, we'd really like to know:

If you work in blue team / SOC / security research / IT security:

  • Do you currently use honeypots?

  • Would a tool like this be useful in your context?

  • What are your biggest difficulties today?

  • What features would matter most to you?

This is purely a student project, and we're still learning, so we'd really appreciate some kindness and constructive feedback :)

Our goal is to build something that makes sense in real-world environments, not just for academic purposes.

Thanks a lot for your time!


文章来源: https://www.reddit.com/r/netsecstudents/comments/1qnlzqr/looking_for_feedback_on_a_student_project_about/
如有侵权请联系:admin#unsafe.sh