How to install/use honeypot for domain take-down problems

Author(s)Olayiwola, Oluwabukunmi
Date Accessioned2021-03-18T13:20:02Z
Date Available2021-03-18T13:20:02Z
Publication Date2020
SWORD Update2020-10-12T19:03:38Z
AbstractDefense against cyberattacks is a major task that has been actively pursued and conducted in the security community over the years. Likewise, domain takedown procedure is known to be an effective way in defending against common cyberattacks like Phishing. It is also used to restrain various cybercrimes similar to malware, contents including child sexual abuse, human trafficking, etc. Therefore, as the development in hardening systems increases, the attack is also relatively expanding. On the other hand, there are cases where securing a system is usually based on the intrusion that has already occurred, which causes us to speculate the attacker’s activities that are usually overlooked. Moreover, due to the increasing level of cyber-attacks and crimes on the Internet, there have been integrity issues relating to domain takedown procedure where some of these illegal domains are being reused, enabling attackers the free access to infiltrate the system. ☐ To better address this problem, this research explores the architecture of honeypot: a security mechanism placed to detect, distract and prevent or restrain illegal attempt/activities against information system. It further describes how to install or use a honeypot to combat domain takedown problems. In addition, this study shows a detailed literature review of previous researcher’s view on honeypot and domain takedown problems as well as their solutions, leaving us with the conclusion that no chances should be given in a secure computer system. There should always be active preparation and defense against any sort of such attacks.en_US
AdvisorWang, Haining
DegreeM.S.
DepartmentUniversity of Delaware, Department of Electrical and Computer Engineering
DOIhttps://doi.org/10.58088/15pz-n178
Unique Identifier1242229234
URLhttps://udspace.udel.edu/handle/19716/28845
Languageen
PublisherUniversity of Delawareen_US
URIhttps://login.udel.idm.oclc.org/login?url=https://www.proquest.com/dissertations-theses/how-install-use-honeypot-domain-take-down/docview/2458563443/se-2?accountid=10457
KeywordsSecurityen_US
KeywordsCyber-attacksen_US
KeywordsCybercrimeen_US
TitleHow to install/use honeypot for domain take-down problemsen_US
TypeThesisen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Olayiwola_udel_0060M_14375.pdf
Size:
664.84 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.22 KB
Format:
Item-specific license agreed upon to submission
Description: