AI RESEARCH
Towards Agentic Honeynet Configuration
arXiv CS.AI
•
ArXi:2603.14122v1 Announce Type: cross Honeypots are deception systems that emulate vulnerable services to collect threat intelligence. While deploying many honeypots increases the opportunity to observe attacker behaviour, in practise network and computational resources limit the number of honeypots that can be exposed. Hence, practitioners must select the assets to deploy, a decision that is typically made statically despite attackers' tactics evolving over time.