Researching Cybercrimes 2021
DOI: 10.1007/978-3-030-74837-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Honeypots for Cybercrime Research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 46 publications
0
4
0
Order By: Relevance
“…Although limitations exist, and future research is warranted, one thing is evident: human-based interventions must not be dismissed when developing comprehensive cybersecurity prevention strategies (Howell et al, 2019; Perkins & Howell, 2021). Technological innovation and target hardening will always have a place in cybercrime prevention, but to overlook what does and does not work in a sociological and psychological context regarding those engaged in cybercrime perpetration is a drastic mistake.…”
Section: Discussionmentioning
confidence: 99%
“…Although limitations exist, and future research is warranted, one thing is evident: human-based interventions must not be dismissed when developing comprehensive cybersecurity prevention strategies (Howell et al, 2019; Perkins & Howell, 2021). Technological innovation and target hardening will always have a place in cybercrime prevention, but to overlook what does and does not work in a sociological and psychological context regarding those engaged in cybercrime perpetration is a drastic mistake.…”
Section: Discussionmentioning
confidence: 99%
“…Criminologists often use honeypots to better understand cybercrime (Perkins and Howell, 2021). Honeypots are computer tools designed to attract Internet users to interact with them and collect the data this interaction generates (Spitzner, 2002).…”
Section: Online Ads As Honeypotsmentioning
confidence: 99%
“…When designing and using honeypots, it is important to consider the activity of bots online. Without proper filters, bots can alter the data collected and thus affect analysis (Perkins and Howell, 2021; see also Vetterl, 2020). For example, a repeated count of intrusion attempts may be due to bot activity and not necessarily to humans.…”
Section: Online Ads As Honeypotsmentioning
confidence: 99%
“…1) The sensors subsystem: Sensors are servers that are intentionally exposed to the public network, pretending to offer something interesting for the attacker. A lot of effort has been made to create such technology leading to what is known as a honeypot [23]. Which is a data framework asset whose esteem lies in unauthorized or unlawful utilization of that asset, which means that honeypots derive their values from the threats using them [24].…”
Section: A Dataset Collection Setupmentioning
confidence: 99%