Decoy firmware that pretends to be a server, then logs the attacker’s intent on the same concept grid that powers the rest of our stack. Recon, exploit, credential probe, remote-code-execution — already labelled by the time it hits disk.
// Sample concept record { "ts": 1777416448, "concept": "ENABLE", "trigger": "wget", "hash": "8e96ff3b..." }
| Concern | NovaHoney | Generic firewall / packet log |
|---|---|---|
| Output | Labelled attacker intent | Raw packets / pcap |
| Payload storage | Hash only — safe to forward | Full payload — exfil risk in its own right |
| Triage cost | Concepts already named at capture time | Analyst rebuilds intent from byte streams |
| Footprint | Single ultra-compact native binary | Daemon, agent, ruleset, log forwarder |
| Cross-deployment correlation | Hash + concept profile, by design | Manual SIEM correlation |