{"id":"https://openalex.org/W4414229563","doi":"https://doi.org/10.1109/jiot.2025.3609800","title":"A Mimic Honeypot Construction Method Based on Incomplete Information Zero-Sum Stochastic Games and Q-Learning","display_name":"A Mimic Honeypot Construction Method Based on Incomplete Information Zero-Sum Stochastic Games and Q-Learning","publication_year":2025,"publication_date":"2025-09-16","ids":{"openalex":"https://openalex.org/W4414229563","doi":"https://doi.org/10.1109/jiot.2025.3609800"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3609800","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3609800","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/jiot.2025.3609800","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108825823","display_name":"Sisi Shao","orcid":"https://orcid.org/0009-0005-9026-0133"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]},{"id":"https://openalex.org/I77631543","display_name":"Wuxi Institute of Technology","ror":"https://ror.org/00ab95029","country_code":"CN","type":"education","lineage":["https://openalex.org/I77631543"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sisi Shao","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuxi University, Wuxi, China","School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuxi University, Wuxi, China","institution_ids":["https://openalex.org/I77631543"]},{"raw_affiliation_string":"School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111300617","display_name":"Zongkai Ji","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zongkai Ji","raw_affiliation_strings":["School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038562493","display_name":"Xianling Qian","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xukun Qian","raw_affiliation_strings":["School of Automation, the Institute of High Performance Computing and Bigdata and Jiangsu HPC and Intelligent Processing Engineer Research Center, Nanjing University of Posts and Telecommunications, Nanjing, China","School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, the Institute of High Performance Computing and Bigdata and Jiangsu HPC and Intelligent Processing Engineer Research Center, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039792198","display_name":"Fei Wu","orcid":"https://orcid.org/0000-0001-5498-4947"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Wu","raw_affiliation_strings":["School of Automation, the Institute of High Performance Computing and Bigdata and Jiangsu HPC and Intelligent Processing Engineer Research Center, Nanjing University of Posts and Telecommunications, Nanjing, China","School of Automation, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, the Institute of High Performance Computing and Bigdata and Jiangsu HPC and Intelligent Processing Engineer Research Center, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"School of Automation, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021798148","display_name":"Shangdong Liu","orcid":"https://orcid.org/0000-0002-8511-7544"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shangdong Liu","raw_affiliation_strings":["School of Automation, the Institute of High Performance Computing and Bigdata and Jiangsu HPC and Intelligent Processing Engineer Research Center, Nanjing University of Posts and Telecommunications, Nanjing, China","School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, the Institute of High Performance Computing and Bigdata and Jiangsu HPC and Intelligent Processing Engineer Research Center, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053206926","display_name":"Yimu Ji","orcid":"https://orcid.org/0000-0001-7019-3942"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yimu Ji","raw_affiliation_strings":["School of Automation, the Institute of High Performance Computing and Bigdata and Jiangsu HPC and Intelligent Processing Engineer Research Center, Nanjing University of Posts and Telecommunications, Nanjing, China","School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, the Institute of High Performance Computing and Bigdata and Jiangsu HPC and Intelligent Processing Engineer Research Center, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5108825823"],"corresponding_institution_ids":["https://openalex.org/I41198531","https://openalex.org/I77631543"],"apc_list":null,"apc_paid":null,"fwci":1.2181,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83557957,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"12","issue":"23","first_page":"50262","last_page":"50278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10057","display_name":"Face and Expression Recognition","score":0.482699990272522,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10057","display_name":"Face and Expression Recognition","score":0.482699990272522,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10320","display_name":"Neural Networks and Applications","score":0.47909998893737793,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13832","display_name":"Advanced Decision-Making Techniques","score":0.4269999861717224,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9937000274658203},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5331000089645386},{"id":"https://openalex.org/keywords/complete-information","display_name":"Complete information","score":0.5144000053405762},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.5022000074386597},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4577000141143799},{"id":"https://openalex.org/keywords/bayesian-game","display_name":"Bayesian game","score":0.44510000944137573},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.3894999921321869},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.3799000084400177},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.37959998846054077}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9937000274658203},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8036999702453613},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5861999988555908},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5331000089645386},{"id":"https://openalex.org/C113336015","wikidata":"https://www.wikidata.org/wiki/Q574010","display_name":"Complete information","level":2,"score":0.5144000053405762},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.5022000074386597},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4577000141143799},{"id":"https://openalex.org/C200594392","wikidata":"https://www.wikidata.org/wiki/Q812529","display_name":"Bayesian game","level":4,"score":0.44510000944137573},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.3894999921321869},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.3799000084400177},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.37959998846054077},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.3384000062942505},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.3172000050544739},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.3073999881744385},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.3041999936103821},{"id":"https://openalex.org/C82142266","wikidata":"https://www.wikidata.org/wiki/Q3456604","display_name":"Dynamic Bayesian network","level":3,"score":0.3019999861717224},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.27000001072883606},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.26840001344680786},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2639999985694885},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2637999951839447},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2630000114440918},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.2628999948501587},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.2574000060558319},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.2540999948978424},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3609800","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3609800","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/jiot.2025.3609800","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3609800","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G10118278","display_name":null,"funder_award_id":"550225097","funder_id":"https://openalex.org/F4320328245","funder_display_name":"National University Research Fund of China"},{"id":"https://openalex.org/G4922773151","display_name":null,"funder_award_id":"20KJA520001","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G5133005619","display_name":null,"funder_award_id":"2023YFB2904004","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8569679628","display_name":null,"funder_award_id":"2023YFB2904000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320328245","display_name":"National University Research Fund of China","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W2228323390","https://openalex.org/W2320597598","https://openalex.org/W2775516695","https://openalex.org/W3028506735","https://openalex.org/W3088733693","https://openalex.org/W3092473025","https://openalex.org/W3096676835","https://openalex.org/W3111424810","https://openalex.org/W3112464176","https://openalex.org/W3119389501","https://openalex.org/W3149502919","https://openalex.org/W3156178383","https://openalex.org/W3162111110","https://openalex.org/W3189604664","https://openalex.org/W3190644151","https://openalex.org/W3192790930","https://openalex.org/W3197944870","https://openalex.org/W4206982354","https://openalex.org/W4211053892","https://openalex.org/W4220867808","https://openalex.org/W4310329823","https://openalex.org/W4360765392","https://openalex.org/W4366777291","https://openalex.org/W4376607473","https://openalex.org/W4381736190","https://openalex.org/W4387415129","https://openalex.org/W4387641063","https://openalex.org/W4387975483","https://openalex.org/W4390322227","https://openalex.org/W4390356040","https://openalex.org/W4392007332","https://openalex.org/W4392364798","https://openalex.org/W4396863926","https://openalex.org/W4401508381","https://openalex.org/W4401669141","https://openalex.org/W4402301581","https://openalex.org/W4402575641"],"related_works":[],"abstract_inverted_index":{"Honeypots":[0],"based":[1,91,183],"on":[2,77,92,184],"deception":[3],"technology":[4],"offer":[5],"a":[6,54,86,126],"promising":[7],"solution":[8],"to":[9,30,57,155,166,177],"address":[10,81],"the":[11,18,25,51,62,71,103,110,113,119,157,169,174,185,190,195,213],"asymmetry":[12],"of":[13,20,112,121,139,204,215],"attack":[14],"and":[15,40,69,98,142,207,218],"defense":[16,73],"in":[17,202],"Internet":[19],"Things":[21],"(IoTs).":[22],"However,":[23],"as":[24,53],"IoT":[26,63,104],"security":[27,111],"situation":[28],"continues":[29],"evolve,":[31],"attackers":[32],"can":[33],"identify":[34],"honeypots":[35],"by":[36,118],"analyzing":[37],"system":[38],"characteristics":[39],"network":[41,221],"behaviors,":[42],"launching":[43],"targeted":[44],"virtual":[45],"escape":[46],"attacks":[47],"that":[48,194],"may":[49],"exploit":[50],"honeypot":[52,64,88,114,130,158,176,198,208,216],"stepping":[55],"stone":[56],"compromise":[58,217],"other":[59],"systems.":[60],"Once":[61],"itself":[65],"is":[66,164],"successfully":[67],"identified":[68],"attacked,":[70],"current":[72],"measures":[74],"typically":[75],"rely":[76],"post-attack":[78],"remediation.":[79],"To":[80],"this":[82],"challenge,":[83],"we":[84,124,146],"propose":[85],"mimic":[87,122,175,197],"construction":[89],"method":[90,101],"incomplete":[93,149],"information":[94,150],"zero-sum":[95,151],"stochastic":[96,152],"game":[97,153],"Q-Learning.":[99],"This":[100],"enhances":[102],"honeypot\u2019s":[105],"deceptive":[106,205],"capabilities":[107],"while":[108],"ensuring":[109,219],"itself.":[115],"Firstly,":[116],"inspired":[117],"concept":[120],"defense,":[123],"design":[125],"dynamic":[127],"heterogeneous":[128],"redundancy":[129],"(mimic":[131],"honeypot),":[132],"which":[133],"contains":[134],"multiple":[135],"business":[136,141],"executors":[137],"composed":[138],"both":[140],"virtualization":[143],"layers.":[144],"Secondly,":[145],"establish":[147],"an":[148],"model":[154],"represent":[156],"attack-defense":[159],"scenario.":[160],"The":[161],"Q-Learning":[162],"algorithm":[163],"employed":[165],"solve":[167],"for":[168],"Bayesian":[170],"Nash":[171],"equilibrium,":[172],"enabling":[173],"adaptively":[178],"adjust":[179],"its":[180],"deployment":[181],"strategies":[182],"attacker\u2019s":[186],"observed":[187],"actions.":[188],"Finally,":[189],"experimental":[191],"results":[192],"demonstrate":[193],"proposed":[196],"outperforms":[199],"existing":[200],"methods":[201],"terms":[203],"effectiveness":[206],"self-protection":[209],"capabilities,":[210],"significantly":[211],"reducing":[212],"likelihood":[214],"robust":[220],"defense.":[222]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
