eCite Digital Repository

Creating honeypots to prevent online child exploitation


Scanlan, J and Watters, PA and Prichard, J and Hunn, C and Spiranovic, C and Wortley, R, Creating honeypots to prevent online child exploitation, Future Internet, 14, (4) pp. 1-14. ISSN 1999-5903 (2022) [Refereed Article]

Pending copyright assessment - Request a copy

DOI: doi:10.3390/fi14040121


Honeypots have been a key tool in controlling and understanding digital crime for several decades. The tool has traditionally been deployed against actors who are attempting to hack into systems or as a discovery mechanism for new forms of malware. This paper presents a novel approach to using a honeypot architecture in conjunction with social networks to respond to non-technical digital crimes. The tool is presented within the context of Child Exploitation Material (CEM), and to support the goal of taking an educative approach to Internet users who are developing an interest in this material. The architecture that is presented in the paper includes multiple layers, including recruitment, obfuscation, and education. The approach does not aim to collect data to support punitive action, but to educate users, increasing their knowledge and awareness of the negative impacts of such material.

Item Details

Item Type:Refereed Article
Keywords:child exploitation prevention, honeypot, social media
Research Division:Information and Computing Sciences
Research Group:Cybersecurity and privacy
Research Field:System and network security
Objective Division:Law, Politics and Community Services
Objective Group:Justice and the law
Objective Field:Crime prevention
UTAS Author:Scanlan, J (Dr Joel Scanlan)
UTAS Author:Prichard, J (Associate Professor Jeremy Prichard)
UTAS Author:Hunn, C (Ms Charlotte Hunn)
UTAS Author:Spiranovic, C (Dr Caroline Spiranovic)
ID Code:149835
Year Published:2022
Deposited By:Australian Institute of Health Service Management
Deposited On:2022-04-15
Last Modified:2022-05-06

Repository Staff Only: item control page