Honeypots Attract More Than Just Bears Jamie O’Hare INTRO • The Internet can be scanned in under 4 minutes. As requirements for Internet-wide scanning (IWS) became modest, it has emerged as a powerful multipurpose cybersecurity tool. • Using honeypots – a decoy system, hackers are baited into attacking the deliberately vulnerable system. Allowing the defender to gain valuable insight into the hacker’s behaviour. RESEARCH QUESTION • What is the impact and implications from the deployment Non-Cognitive Predictors of Student Success: A Predictive Comparison Between Domestic and International Students ofValidity Internet-facing systems, and how can any security concerns be countered?
Upon exposure to the Internet, your device could be hacked in less than 4 minutes. What countermeasures 1
can buy you more time? 3
METHODOLOGY The observational methodology will entail: 1. Upon deploying a honeypot on the Internet, have it indexed by IWS actors. 2. Record all interactions with said honeypot. 3. Enrich interaction data in realtime. Dr Natalie Coull, system Dr Ian Ferguson & Dr Gavin Internet-facing deployment Hales
recommendations will be informed by comparisons made between
2
different honeypot configurations. Image: