Loading [a11y]/accessibility-menu.js
Development and implementation of a Honeypot-trap | IEEE Conference Publication | IEEE Xplore

Development and implementation of a Honeypot-trap


Abstract:

This article observes the possibility of protection network resources from malicious attacks using traps that simulate SSH service. There are overviewed main types of att...Show More

Abstract:

This article observes the possibility of protection network resources from malicious attacks using traps that simulate SSH service. There are overviewed main types of attacks, analyzed existing software solutions, its basic working principles and opportunities for further improvement. In addition, there is described author's solution, which can increase the attractiveness of SSH honeypot working under Ubuntu OS.
Date of Conference: 01-03 February 2017
Date Added to IEEE Xplore: 27 April 2017
ISBN Information:
Conference Location: St. Petersburg and Moscow, Russia

Contact IEEE to Subscribe

References

References is not available for this document.