Abstract:
This article observes the possibility of protection network resources from malicious attacks using traps that simulate SSH service. There are overviewed main types of att...Show MoreMetadata
Abstract:
This article observes the possibility of protection network resources from malicious attacks using traps that simulate SSH service. There are overviewed main types of attacks, analyzed existing software solutions, its basic working principles and opportunities for further improvement. In addition, there is described author's solution, which can increase the attractiveness of SSH honeypot working under Ubuntu OS.
Published in: 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)
Date of Conference: 01-03 February 2017
Date Added to IEEE Xplore: 27 April 2017
ISBN Information: