Abstract | ||
---|---|---|
Honeypots are a proven technology for network defence and forensics. This paper focuses on attacks directed to network devices that utilise SSH services. The research uses the SSH honeypot Kippo to gather data about attacks on the SSH service. Kippo uses python and SSL to generate mock SSH services and also provides a filesystem honeypot for attackers to interact with. The preliminary research has found that attacks of this type are manifest, have a variety of profiles and may be launched from a variety of platforms. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1007/978-3-642-35362-8_18 | CSS |
Keywords | Field | DocType |
secure host,proven technology,network device,preliminary research,network defence,ssh service,mock ssh service,filesystem honeypot,utilise ssh service,cyber attack,honeypot,ssh,python | Honeypot,World Wide Web,Cyber-attack,Computer security,Networking hardware,Engineering,Python (programming language) | Conference |
Citations | PageRank | References |
1 | 0.43 | 1 |
Authors | ||
1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Craig Valli | 1 | 132 | 33.90 |