“…Therefore, a type of efficient honeypot system, whereby the attack activities can be sensitively classified and processed in fine-grained ways, and then consumed by the unperceived honeypot resource with appropriate countermeasures is highly needed [22]. Nevertheless, the existing honeypot systems are not able to provide this kind of comprehensiveness, because there is a lack of architecture that can facilitate the all-round honeypot design.…”