University of Tasmania
Browse
149835 - Creating honeypots to prevent online child exploitation.pdf (1.77 MB)

Creating honeypots to prevent online child exploitation

Download (1.77 MB)
journal contribution
posted on 2023-05-21, 07:17 authored by Joel ScanlanJoel Scanlan, Watters, PA, Jeremy PrichardJeremy Prichard, Hunn, C, Caroline SpiranovicCaroline Spiranovic, Wortley, R
Honeypots have been a key tool in controlling and understanding digital crime for several decades. The tool has traditionally been deployed against actors who are attempting to hack into systems or as a discovery mechanism for new forms of malware. This paper presents a novel approach to using a honeypot architecture in conjunction with social networks to respond to non-technical digital crimes. The tool is presented within the context of Child Exploitation Material (CEM), and to support the goal of taking an educative approach to Internet users who are developing an interest in this material. The architecture that is presented in the paper includes multiple layers, including recruitment, obfuscation, and education. The approach does not aim to collect data to support punitive action, but to educate users, increasing their knowledge and awareness of the negative impacts of such material.

History

Publication title

Future Internet

Volume

14

Issue

4

Pagination

1-14

ISSN

1999-5903

Department/School

Australian Institute of Health Service Management (AIHSM)

Publisher

MDPI AG

Place of publication

Switzerland

Rights statement

Copyright: © 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons 4.0 International (CC BY 4.0) license (https://creativecommons.org/licenses/by/4.0/).

Repository Status

  • Open

Socio-economic Objectives

Internet, digital and social media; Crime prevention

Usage metrics

    University Of Tasmania

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC