Abstract: Advanced Persistent Threats (APTs) pose significant risks to modern network infrastructures. Traditional honeypot systems, while useful for deception and attack intelligence gathering, often lack adaptability, making them ineffective against sophisticated adversaries. This study proposes a reinforced honeypot technique that integrates game theory and reinforcement learning (RL) to enhance cyber defence mechanisms. The methodology used for.......
Keywords: Advanced Persistent Threats; Honeypot; Game Theory; Reinforcement Learning; Cyber Defence
[1].
Amal, M., &Venkadesh, P. (2022). Review of cyber attack detection: Honeypot system. Webology, 19(1). https://doi.org/10.14704/WEB/V19I1/WEB19370
[2].
Ebere Uzoka Chidi, E Anoliefo, C Udanor, AT Chijindu, LO Nwobodo (2025)” A Blind navigation guide model for obstacle avoidance using distance vision estimation based YOLO-V8n; Journal of the Nigerian Society of Physical Sciences, 2292-229; https://doi.org/10.46481/jnsps.2025.2292
[3].
Ilg, N., Duplys, P., Sisejkovic, D., & Menth, M. (2023). A survey of contemporary open-source honeypots, frameworks, and tools. Journal of Network and Computer Applications, 220, 103737. https://doi.org/10.1016/j.jnca.2023.103737
[4].
Khoje, M. (2023). Securing data platforms: Strategic masking techniques for privacy and security for B2B enterprise data. International Journal of Computer Trends and Technology, 71(11), 46–54. https://doi.org/10.14445/22312803/IJCTT-V71I11P107
[5].
Lee, S. Y., & Park, J. M. (2024). Sampled-data stabilisation for networked control systems under deception attack and the transmission delay. Communications in Nonlinear Science and Numerical Simulation, 131, 107817. https://doi.org/10.1016/j.cnsns.2024.107817.