Academic Program

Research Access Program

Complimentary, time-limited access to NeroSwarm for academic and independent research focused on actionable cybersecurity outcomes.

Last updatedJanuary 29, 2026 at 6:32 AM PST

Overview

We invite researchers and students to explore the NeroSwarm cyber deception platform free for 3 months. This program is designed for non-commercial research that advances detection, analysis, and defensive security practices.

Program Details

NeroSwarm Honeypot is committed to advancing research by providing free access to our Deception-as-a-Service platform. The platform includes AI-powered decoys and honeytokens designed for early breach warning and advanced threat detection.

What you can explore

High-interaction deception workflows, protocol coverage across common network services, and visibility into attacker behaviors through structured telemetry and dashboards.

Eligibility

Who can apply: Academics, independent researchers, and research institutions focused on cybersecurity.

Research criteria: We prioritize projects with the potential to positively impact real-world security and that aim to share findings with the broader community.

.edu email required

Currently, we only accept applications from researchers and students with a .edu email address, ensuring the applicant is affiliated with a university. We may extend this to other verified research identities in the future.

Access Level

  • One cloud-based honeypot: Deploy a versatile cloud-based honeypot on your own server, taking advantage of the platform’s network protocol support.
  • Unlimited honeytokens: Use AI-generated content in as many honeytokens as needed, with document interaction visibility from the dashboard.
  • Unlimited IP reputation research: Conduct extensive IP reputation analysis without limitations, leveraging insights from globally deployed honeypots.

Qualifying Research Projects

We prioritize projects aimed at advancing cybersecurity knowledge and practice on a global scale through the deployment of honeypots. We welcome applications focused on:

  • Identifying zero-day exploits: Capture and analyze unknown exploits before they become widely known or patched.
  • Developing mitigation strategies: Use real-time data to devise effective countermeasures against emerging threats.
  • Refining threat intelligence: Correlate attack vectors, sources, and methodologies to improve threat intelligence frameworks.
  • Improving incident response: Reduce time to detect and mitigate breaches by analyzing honeypot telemetry.

Projects focused on commercial purposes, such as bug bounty hunting or internal threat analysis for companies, are not eligible for this free access.

Apply by Email

Submit your request

Email your application to [email protected] and include the information below.

  • Project description: 3-4 sentences detailing your research goals and where you intend to publish or present your findings.
  • About yourself: 2-3 sentences about your background, including academic or research credentials.
  • Specific needs: The resources or support you need from NeroSwarm to conduct your research.
  • Non-commercial use confirmation: Confirm that data collected will be used solely for non-commercial research purposes.
  • Agreement to terms: Confirm that you have read and agree to the terms of the NeroSwarm service agreement Read our service agreement .

Application Process

  1. Submit a request: Provide a concise project proposal outlining goals, methodologies, expected outcomes, and relevant background.
  2. Evaluation: We review applications for impact, feasibility, alignment with research goals, and potential benefit to the broader community. We may request clarifications.
  3. Approval: If successful, we provide access details and support throughout the research period.
Usage guidelines

Researchers and students must use the platform ethically, ensuring no malicious or commercial use. Publications and presentations must cite NeroSwarm appropriately.

Ongoing Support & Extension

We provide support throughout your research period, including:

  • Technical assistance: Help with setup, configuration, and troubleshooting for honeypots and decoys.
  • Data interpretation help: Guidance on trends, patterns, and insights derived from platform telemetry.
  • Maximizing platform potential: Recommendations on effective deployment and data collection practices.

Extension of access

You may request a one-time extension of your license for an additional three months, subject to approval. To request an extension, submit a progress report describing:

  • Achievements during the initial period: Milestones, data collected, and preliminary findings.
  • Plans for continued research: Activities, methods, and expected outcomes for the extension period.
  • Preliminary findings or publications: Any outputs that demonstrate impact and research value.

Extension requests are evaluated based on merit, feasibility, and resource availability. We may follow up for additional information.

Publication & Citation

We ask that any publications resulting from research conducted using NeroSwarm Honeypot data acknowledge our service. Proper citation is required.

For non-academic publications such as blog posts, include a link to the NeroSwarm website https://neroswarm.com/ to acknowledge your use of the platform.

Suggested citation

If you have published a paper or presented your research at a conference, let us know so we can highlight your work.

Contact

For applications or research access inquiries, email [email protected] .