Creating Honeypots to Prevent Online Child Exploitation

Loading...
Thumbnail Image
File version

Version of Record (VoR)

Author(s)
Scanlan, J
Watters, PA
Prichard, J
Hunn, C
Spiranovic, C
Wortley, R
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
2022
Size
File type(s)
Location
Abstract

Honeypots have been a key tool in controlling and understanding digital crime for several decades. The tool has traditionally been deployed against actors who are attempting to hack into systems or as a discovery mechanism for new forms of malware. This paper presents a novel approach to using a honeypot architecture in conjunction with social networks to respond to non-technical digital crimes. The tool is presented within the context of Child Exploitation Material (CEM), and to support the goal of taking an educative approach to Internet users who are developing an interest in this material. The architecture that is presented in the paper includes multiple layers, including recruitment, obfuscation, and education. The approach does not aim to collect data to support punitive action, but to educate users, increasing their knowledge and awareness of the negative impacts of such material.

Journal Title

Future Internet

Conference Title
Book Title
Edition
Volume

14

Issue

4

Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).

Item Access Status
Note
Access the data
Related item(s)
Subject

Criminology

Persistent link to this record
Citation

Scanlan, J; Watters, PA; Prichard, J; Hunn, C; Spiranovic, C; Wortley, R, Creating Honeypots to Prevent Online Child Exploitation, Future Internet, 2022, 14 (4), pp. 121

Collections