Abstract: As cyber security threats continue to evolve in sophistication, honeypots solution remain essential tools for observing attacker behavior and gathering threat intelligence. Traditional ...