Honeypots
This project investigates how to better detect and constrain attackers of computer environments, including servers, desktops, email, smartphones and other IoT devices.We deploy intentionally vulnerable devices, or honeypots, and monitor the activity of individuals who attempt to attack the devices. Our findings show how to “nudge” attackers to behave predictably, and inform how to mitigate the consequences of cyberattacks to environments and victims.

Project Outcomes
Articles
- Examining the crime prevention claims of Crime Prevention through Environmental Design on System Trespassing Behaviors: A Randomized Experiment
- Restrictive Deterrent Effects of a Warning Banner in an Attacked Computer System
- The Effect of a Surveillance Banner in an Attacked Computer System: Additional Evidence for the Relevance of Restrictive Deterrence in Cyberspace
- On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents
- Illegal Roaming and File Manipulation on Target Computers: Assessing the Effect of Sanction Threats on System Trespassers’ Online Behaviors