SSH Honeypot: Building, Deploying and Analysis

Abstract

This article is set to discuss the various techniques that can be used while developing a honeypot, of any form, while considering the advantages and disadvantages of these very different methods. The foremost aims are to cover the principles of the Secure Shell (SSH), how it can be useful and more importantly, how attackers can gain access to a system by using it. The article involved the development of multiple low interaction honeypots. The low interaction honeypots that have been developed make use of the highly documented libssh and even editing the source code of an already available SSH daemon. Finally the aim is to combine the results with the vastly distributed Kippo honeypot, in order to be able to compare and contrast the results along with usability and necessity of particular features. Providing a clean and simple description for less knowledgeable users to be able to create and deploy a honeypot of production quality, adding security advantages to their network instantaneously.

Authors and Affiliations

Harry Doubleday, Leandros Maglaras, Helge Janicke

Keywords

Related Articles

Feed Forward Neural Network Based Eye Localization and Recognition Using Hough Transform

Eye detection is a pre-requisite stage for many applications such as face recognition, iris recognition, eye tracking, fatigue detection based on eye-blink count and eye-directed instruction control. As the location of...

Enhancing the Secured Software Framework using Vulnerability Patterns and Flow Diagrams

This article describes the process of simplifying the software security classification. The inputs of this process include a reference model from previous researcher and existing Common Vulnerabilities and Exposure (CVE)...

MCMC Particle Filter Using New Data Association Technique with Viterbi Filtered Gate Method for Multi-Target Tracking in Heavy Clutter

 Improving data association technique in dense clutter environment for multi-target tracking used in Markov chain Monte Carlo based particle filter (MCMC-PF) are discussed in this paper. A new method named Viterbi f...

Clustering Student Data to Characterize Performance Patterns 

Over the years the academic records of thousands of students have accumulated in educational institutions and most of these data are available in digital format. Mining these huge volumes of data may gain a deeper insigh...

Model for Predicting Educational Domain Rate based on the Regional Level

The geographic information system (GIS) is rapidly becoming the part of current technology trends. GIS can be used to identify the factors that become the reason for an individual to adopt a field or subject. We used GIS...

Download PDF file
  • EP ID EP133486
  • DOI 10.14569/IJACSA.2016.070518
  • Views 124
  • Downloads 0

How To Cite

Harry Doubleday, Leandros Maglaras, Helge Janicke (2016). SSH Honeypot: Building, Deploying and Analysis. International Journal of Advanced Computer Science & Applications, 7(5), 117-121. https://www.europub.co.uk/articles/-A-133486