How to install/use honeypot for domain take-down problems

Date
2020
Journal Title
Journal ISSN
Volume Title
Publisher
University of Delaware
Abstract
Defense against cyberattacks is a major task that has been actively pursued and conducted in the security community over the years. Likewise, domain takedown procedure is known to be an effective way in defending against common cyberattacks like Phishing. It is also used to restrain various cybercrimes similar to malware, contents including child sexual abuse, human trafficking, etc. Therefore, as the development in hardening systems increases, the attack is also relatively expanding. On the other hand, there are cases where securing a system is usually based on the intrusion that has already occurred, which causes us to speculate the attacker’s activities that are usually overlooked. Moreover, due to the increasing level of cyber-attacks and crimes on the Internet, there have been integrity issues relating to domain takedown procedure where some of these illegal domains are being reused, enabling attackers the free access to infiltrate the system. ☐ To better address this problem, this research explores the architecture of honeypot: a security mechanism placed to detect, distract and prevent or restrain illegal attempt/activities against information system. It further describes how to install or use a honeypot to combat domain takedown problems. In addition, this study shows a detailed literature review of previous researcher’s view on honeypot and domain takedown problems as well as their solutions, leaving us with the conclusion that no chances should be given in a secure computer system. There should always be active preparation and defense against any sort of such attacks.
Description
Keywords
Security, Cyber-attacks, Cybercrime
Citation