SSH Honeypot: Building, Deploying and Analysis

Abstract

This article is set to discuss the various techniques that can be used while developing a honeypot, of any form, while considering the advantages and disadvantages of these very different methods. The foremost aims are to cover the principles of the Secure Shell (SSH), how it can be useful and more importantly, how attackers can gain access to a system by using it. The article involved the development of multiple low interaction honeypots. The low interaction honeypots that have been developed make use of the highly documented libssh and even editing the source code of an already available SSH daemon. Finally the aim is to combine the results with the vastly distributed Kippo honeypot, in order to be able to compare and contrast the results along with usability and necessity of particular features. Providing a clean and simple description for less knowledgeable users to be able to create and deploy a honeypot of production quality, adding security advantages to their network instantaneously.

Authors and Affiliations

Harry Doubleday, Leandros Maglaras, Helge Janicke

Keywords

Related Articles

An Improved Image Steganography Method Based on LSB Technique with Random Pixel Selection

With the rapid advance in digital network, information technology, digital libraries, and particularly World Wide Web services, many kinds of information could be retrieved any time. Thus, the security issue has become o...

Lightweight Internet Traffic Classification based on Packet Level Hidden Markov Models

During the last decade, Internet traffic classification finds its importance not only to safeguard the integrity and security of network resources, but also to ensure the quality of service for business critical applicat...

Improved Langley and Ratio Langley Methods for Improving Sky-Radiometer Accuracy

Improved Langley Method (ILM) is proposed to improve the calibration accuracy of the sky-radiometer. The ILM uses that the calibration coefficients of other arbitrary wavelengths can be presumed from the calibration coef...

Exploiting Temporal Information in Documents and Query to Improve the Information Retrieval Process: Application to Medical Articles

In the medical field, scientific articles represent a very important source of knowledge for researchers of this domain. But due to the large volume of scientific articles published on the web, an efficient detection and...

Static Filtered Sky Color Constancy

In Computer Vision, the sky color is used for lighting correction, image color enhancement, horizon alignment, image indexing, and outdoor image classification and in many other applications. In this article, for robust...

Download PDF file
  • EP ID EP133486
  • DOI 10.14569/IJACSA.2016.070518
  • Views 120
  • Downloads 0

How To Cite

Harry Doubleday, Leandros Maglaras, Helge Janicke (2016). SSH Honeypot: Building, Deploying and Analysis. International Journal of Advanced Computer Science & Applications, 7(5), 117-121. https://europub.co.uk/articles/-A-133486