Home
World Journal of Advanced Research and Reviews
International Journal with High Impact Factor for fast publication of Research and Review articles

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • WJARR CrossMark Policy
    • Publication Ethics
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Current Issue
    • Issue in Progress
    • Past Issues
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

eISSN: 2581-9615 || CODEN (USA): WJARAI || Impact Factor: 8.2 || ISSN Approved Journal

Literature review on advanced persistent threats management with deception techniques

Breadcrumb

  • Home
  • Literature review on advanced persistent threats management with deception techniques

Chukwuebuka Bartholomew Onah *, Chukwudi Linda Nnadi and Chimezie Fredrick Ugwu

Department of Computer Science, Faculty of Faculty of Technology, Institute of Management and Technology, (IMT), Nigeria.

Review Article

World Journal of Advanced Research and Reviews, 2025, 27(01), 2005-2017

Article DOI: 10.30574/wjarr.2025.27.1.2509

DOI url: https://doi.org/10.30574/wjarr.2025.27.1.2509

Received on 21 May 2025; revised on 08 July 2025; accepted on 11 July 2025

This study investigates the dynamic threat landscape of cybersecurity, with a particular focus on Advanced Persistent Threats (APTs) and various web-based and network-based attacks. Through a theoretical approach, it examines key attack vectors including structural query language (SQL) Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), Directory Traversal, Server-Side Request Forgery (SSRF), and Command Injection, highlighting the mechanisms through which attackers exploit vulnerabilities in web and network systems. To counter these evolving threats, the research explores theoretical frameworks such as Game Theory and Reinforcement Learning (RL). Game Theory is applied to honeypot optimisation, modelling strategic interactions between attackers and defenders, while RL enables adaptive learning for dynamic defence configurations. The integration of these concepts presents a proactive cybersecurity approach, improving detection capabilities, resource allocation, and system resilience. This study concludes that combining strategic modelling with intelligent learning systems is vital for building robust cybersecurity defences capable of addressing modern and emerging threats.

Advanced Persistent Threat; Cybersecurity; Network-Based Attacks; Structural Query Language; Injection

https://journalwjarr.com/sites/default/files/fulltext_pdf/WJARR-2025-2509.pdf

Preview Article PDF

Chukwuebuka Bartholomew Onah, Chukwudi Linda Nnadi and Chimezie Fredrick Ugwu. Literature review on advanced persistent threats management with deception techniques. World Journal of Advanced Research and Reviews, 2025, 27(01), 2005-2017. Article DOI: https://doi.org/10.30574/wjarr.2025.27.1.2509.

Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0

Footer menu

  • Contact

Copyright © 2026 World Journal of Advanced Research and Reviews - All rights reserved

Developed & Designed by VS Infosolution