SSH Honeypot: Building, Deploying and Analysis

Abstract

This article is set to discuss the various techniques that can be used while developing a honeypot, of any form, while considering the advantages and disadvantages of these very different methods. The foremost aims are to cover the principles of the Secure Shell (SSH), how it can be useful and more importantly, how attackers can gain access to a system by using it. The article involved the development of multiple low interaction honeypots. The low interaction honeypots that have been developed make use of the highly documented libssh and even editing the source code of an already available SSH daemon. Finally the aim is to combine the results with the vastly distributed Kippo honeypot, in order to be able to compare and contrast the results along with usability and necessity of particular features. Providing a clean and simple description for less knowledgeable users to be able to create and deploy a honeypot of production quality, adding security advantages to their network instantaneously.

Authors and Affiliations

Harry Doubleday, Leandros Maglaras, Helge Janicke

Keywords

Related Articles

Bipolar Factor and Systems Analysis skills of Student Computing Professionals at University of Botswana, Gaborone.

Temperamental suitability (personality traits) could be a factor to consider in career placement and professional development. It could also be an indicator of professional success or failure in any profession such as Sy...

Fraud Detection using Machine Learning in e-Commerce

The volume of internet users is increasingly causing transactions on e-commerce to increase as well. We observe the quantity of fraud on online transactions is increasing too. Fraud prevention in e-commerce shall be dev...

FPGA Implementation of RISC-based Memory-centric Processor Architecture

The development of the microprocessor industry in terms of speed, area, and multi-processing has resulted with increased data traffic between the processor and the memory in a classical processor-centric Von Neumann comp...

Breast Cancer Detection with Mammogram Segmentation: A Qualitative Study

Mammography is specialized medical imaging for scanning the breasts. A mammography exam (A Mammogram) helps in the early detection and diagnosis of breast cancer. Mammogram image segmentation is useful in detecting the b...

Adoption of e-Government in Pakistan: Supply Perspective

Electronic Government, also known as e-Government, is a convenient way for citizens to access e- services and to conduct business with the government using the Internet. It saves citizens and the government both time and...

Download PDF file
  • EP ID EP133486
  • DOI 10.14569/IJACSA.2016.070518
  • Views 105
  • Downloads 0

How To Cite

Harry Doubleday, Leandros Maglaras, Helge Janicke (2016). SSH Honeypot: Building, Deploying and Analysis. International Journal of Advanced Computer Science & Applications, 7(5), 117-121. https://europub.co.uk/articles/-A-133486