Creating Honeypots to Prevent Online Child Exploitation
Honeypots have been a key tool in controlling and understanding digital crime for several decades. The tool has traditionally been deployed against actors who are attempting to hack into systems or as a discovery mechanism for new forms of malware. This paper presents a novel approach to using a hon...
Main Authors: | Joel Scanlan, Paul A. Watters, Jeremy Prichard, Charlotte Hunn, Caroline Spiranovic, Richard Wortley |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-04-01
|
Series: | Future Internet |
Subjects: | |
Online Access: | https://www.mdpi.com/1999-5903/14/4/121 |
Similar Items
-
A Comparison of an Adaptive Self-Guarded Honeypot with Conventional Honeypots
by: Sereysethy Touch, et al.
Published: (2022-05-01) -
Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis
by: Yonas Kibret, et al.
Published: (2013-04-01) -
Evaluation and Comparison of the Use of Reinforcement Learning Algorithms on SSH Honeypot
by: Marco Ariano Kristyanto, et al.
Published: (2024-02-01) -
An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation
by: M. Amiri, et al.
Published: (2019-06-01) -
Honeypot
by: Karol Kreft
Published: (2011-06-01)