This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
Analysis of SSH attacks of Darknet using Honeypots
Authors
  Shaik Bhanu,  Girish Khilari,  Varun Kumar
Abstract
A Darknet is a private network and the connections are made only between trusted friends. In the field of computer security, honeypot is an internet attached server that acts as a decoy, to trap the hackers in order to study their activities and monitor how they are able to break into a system. In this paper we present the results of SSH honeypot operations in which it undertook the web trap of attackers who target SSH service in order to gain illegal services. A medium interaction honeypot offers a high interaction level to the attacker and when a connection attempt is made to system port, the honeypot can reply back with specially crafted packets that emulate of a real network services. The fake system has remained online and fully operational, capturing attacks and logging all malicious activity. Lastly we collect the data and analyzed the information.
Keywords- honeypot systems; ssh; security Analysis
Publication Details
Unique Identification Number - IJEDR1501064Page Number(s) - 348-350Pubished in - Volume 3 | Issue 1 | Jan 2015DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  Shaik Bhanu,  Girish Khilari,  Varun Kumar,   "Analysis of SSH attacks of Darknet using Honeypots", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.3, Issue 1, pp.348-350, Jan 2015, Available at :http://www.ijedr.org/papers/IJEDR1501064.pdf
Article Preview
|
|
||||||
|