Hives and Honeypots: Understanding Malicious Activity In Online Accounts

dc.contributor.authorOnaolapo, Jeremiah
dc.date.accessioned2024-05-05T12:13:05Z
dc.date.available2024-05-05T12:13:05Z
dc.date.issued2017-12-11 16:15
dc.description.abstract3MT presented at the 2017 Defence and Security Doctoral Symposium.Account credentials are attractive to cybercriminals who often seek ways to monetise the valuable and sensitive data in online accounts that such credentials guard. However, it is unclear what exactly cybercriminals do with compromised accounts after gaining access. To protect users, it is important for researchers and law enforcement agencies to understand the modus operandi of these criminals. To this end, my research focuses on understanding how cybercriminals compromise and abuse online accounts, with a view to providing insights that will be useful in the development of mitigation techniques. I have developed an open-source infrastructure that is capable of monitoring the activity of cybercriminals that connect to webmail accounts. Similarly, I have studied what happens to compromised documents in the cloud. During the 3MT presentation, I plan to present an overview of my work so far, and also provide a brief glimpse into what comes next.
dc.description.sponsorshipEPSRC grant N008448, EPSRC grant 1490017, Google Faculty Award, Petroleum Technology Development Fund (PTDF), H2020 RISE MSCA grant 691925
dc.identifier.citationOnaolapo, Jeremiah (2017). Hives and Honeypots: Understanding Malicious Activity In Online Accounts. Cranfield Online Research Data (CORD). Dataset. https://doi.org/10.17862/cranfield.rd.5590849.v2
dc.identifier.doi10.17862/cranfield.rd.5590849.v2
dc.identifier.urihttps://dspace.lib.cranfield.ac.uk/handle/1826/21507
dc.publisherCranfield University
dc.rightsCC BY-NC 4.0
dc.rights.urihttps://creativecommons.org/licenses/by-nc/4.0/
dc.subject'Honeypot'
dc.subject'Cybercrime'
dc.subject'Hacker'
dc.subject'DSDS17 3MT'
dc.subject'DSDS17'
dc.subject'Information and Computing Sciences not elsewhere classified'
dc.titleHives and Honeypots: Understanding Malicious Activity In Online Accounts
dc.typeDataset

Files

Original bundle
Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
Onaolapo, Jeremiah_3MT_DSDS17_2017-11.pdf
Size:
1.06 MB
Format:
Adobe Portable Document Format
No Thumbnail Available
Name:
3MT J Onaolapo.mp4
Size:
303.19 MB
Format:
Unknown data format

Collections