SSH Honeypot: Building, Deploying and Analysis

Abstract

This article is set to discuss the various techniques that can be used while developing a honeypot, of any form, while considering the advantages and disadvantages of these very different methods. The foremost aims are to cover the principles of the Secure Shell (SSH), how it can be useful and more importantly, how attackers can gain access to a system by using it. The article involved the development of multiple low interaction honeypots. The low interaction honeypots that have been developed make use of the highly documented libssh and even editing the source code of an already available SSH daemon. Finally the aim is to combine the results with the vastly distributed Kippo honeypot, in order to be able to compare and contrast the results along with usability and necessity of particular features. Providing a clean and simple description for less knowledgeable users to be able to create and deploy a honeypot of production quality, adding security advantages to their network instantaneously.

Authors and Affiliations

Harry Doubleday, Leandros Maglaras, Helge Janicke

Keywords

Related Articles

Improving Usable-Security of Web based Healthcare Management System through Fuzzy AHP

Security is an important concern in web application development that is getting massive consideration from academic and IT industry. In addition, due to big share in web based healthcare management system, usable-securit...

Prediction of Stroke using Data Mining Classification Techniques

Stroke is a neurological disease that occurs when a brain cells die as a result of oxygen and nutrient deficiency. Stroke detection within the first few hours improves the chances to prevent complications and improve hea...

Day-ahead Base, Intermediate, and Peak Load Forecasting using K-Means and Artificial Neural Networks

Industries depend heavily on the capacity and availability of electric power. A typical load curve has three parts, namely, base, intermediate, and peak load. Predicting the three (3) system loads accurately in a power s...

An Empirical Investigation of Predicting Fault Count, Fix Cost and Effort Using Software Metrics

Software fault prediction is important in software engineering field. Fault prediction helps engineers manage their efforts by identifying the most complex parts of the software where errors concentrate. Researchers usua...

Medical Image Retrieval based on the Parallelization of the Cluster Sampling Algorithm

Cluster sampling algorithm is a scheme for sequential data assimilation developed to handle general non-Gaussian and nonlinear settings. The cluster sampling algorithm can be used to solve a wide spectrum of problems tha...

Download PDF file
  • EP ID EP133486
  • DOI 10.14569/IJACSA.2016.070518
  • Views 83
  • Downloads 0

How To Cite

Harry Doubleday, Leandros Maglaras, Helge Janicke (2016). SSH Honeypot: Building, Deploying and Analysis. International Journal of Advanced Computer Science & Applications, 7(5), 117-121. https://europub.co.uk/articles/-A-133486