National Research Nuclear University MEPhI
Question
Asked 10 February 2017

Deleted profile
Is anyone willing to share email server honey pot data to trace scams?
The internet is a wonderful thing but some people use it as a tool to do crimes which predate the internet such as theft and money laundering and few criminologists have skills in dealing with seven continents and their subgroups of languages, religious beliefs, genders, ages. I heard a talk about comparing epidemiologist with finding risk factors for those behaviors that put computer users at risk for being hacked (characteristics making victimization possible (the action of signaling someone out for cruel or unjust treatment)). Is it possible to work backwords and find geopolitical and economic patterns that might cause a person towards cybercrime . I have three examples, one is the suspected hacking of Sony Pictures America by North Korea as retribution for producing the film The Interview. The second example is the hacking of Estonia by Russia during the evolution and the third is provided in the document below. Peter Norvig at Google gave a talk on computers being able to detect similar images but may not have our taxonomy. I think that we can use Twitter and a database of actual spam messages with their header including IP address. Using a whois database such as senderbase we can find the orgins. A lot of security is reactive once an attack has been aimed at a corporation, even if it gets blocked. What we need to do is to find patterns and I think regional news can help. I hope to have a collection of honeypot email servers which attracts mail from spammers reach out to organizations who have existing honey pot email servers so I can get spam email messages with header intact so I can investigate where they are coming from. One of the ways public private partnerships is that no one wants to be defrauded. I believe as long as we can make personas for why the honeypot got the spam, then we can work with this data and mine it using knime open source, senderbase, whois, online intelligence databases, Mozilla ELK, and apache natural language tools. I know there are also some open source tools through Stanford, Gate, nltk, Microsoft Flow,
All Answers (3)
Hello. I have big honeypot project. it contains of 2k ipv4, and lots of ipv6 addresses.
What difference between dnsbl and spamhaus are you trying to reach?
1 Recommendation

Thanks Dmitry for your reply, for me the big difference between dnsbl, spamhaus, phishtank is that they are mostly based on coming up to solutions for single problem instances such as scams. This means that when their IPs are blocked they shift tactics because there is a lack of cooperation on the part of international law enforcement to take care of the root of the problems. This proposed project is to take a look at the role of geopolitics in the motivation of cybercrime so that we can enhance the online criminology or profiling of the security professionals

Hello @Dmitry Silnov can you send a 7 zip file to me containing the honeypot emails at robert.wahlstedt@gmail.com. thank you
Similar questions and discussions
What safeguards are necessary for allowing a variety of users to access their customer bio-metrics?
Srinivasan Ramani
Biometric IDs and the Risks Involved
India has generated 111,15,84,242 Aadhaar IDs as of Feb 1, 2017, as per the Authority (UIDAI) Website https://uidai.gov.in/new/ Each ID is linked to a photograph, ten fingerprints and two iris scans of the person involved. There are major research questions related to these cards that computer scientists and others should study.
What are the safeguards necessary for allowing banks, insurance companies, cell phone companies and others to access an individual’s biometrics for identification or other purposes?
I became acutely aware of the risks involved yesterday when a cell phone company tried to persuade my wife to let them access her fingerprint for comparison with the stored fingerprint associated with her Aadhaar number. Visit
“Your fingerprint is not your own! Meaning of privacy in India!"
in the article addressed by the link below.
Related Publications
Research about skills in analyzing Cyber Crime and Validating its evidence
Cyber Policing and Cyber Crime Investigation" - an e-Content developed under the University Grants Commission (UGC) of India's e-PG Pathshala Programme. The content was developed for the discipline of Criminology and specifically for the Paper - 'Cyber Criminology & Cyber Forensics'. The Principal Investigator was Prof. G. S. Bajpai and Paper Coord...