SSH Honeypot: Building, Deploying and Analysis

Abstract

This article is set to discuss the various techniques that can be used while developing a honeypot, of any form, while considering the advantages and disadvantages of these very different methods. The foremost aims are to cover the principles of the Secure Shell (SSH), how it can be useful and more importantly, how attackers can gain access to a system by using it. The article involved the development of multiple low interaction honeypots. The low interaction honeypots that have been developed make use of the highly documented libssh and even editing the source code of an already available SSH daemon. Finally the aim is to combine the results with the vastly distributed Kippo honeypot, in order to be able to compare and contrast the results along with usability and necessity of particular features. Providing a clean and simple description for less knowledgeable users to be able to create and deploy a honeypot of production quality, adding security advantages to their network instantaneously.

Authors and Affiliations

Harry Doubleday, Leandros Maglaras, Helge Janicke

Keywords

Related Articles

Modeling of the Vegetable Oil Blends Composition

The article presents a computer modeling of blends of vegetable oils for treatment-and-prophylactic and healthy nutrition. To solve this problem, based on biomedical requirements, models of vegetable oil blends have been...

  Scenario-Based Software Reliability Testing Profile for Autonomous Control System

 Operational profile is often used in software reliability testing, but it is limited to non-obvious-operation software such as Autonomous Control System. After analyzing the autonomous control system and scenario t...

An Effective Storage Mechanism for High Performance Computing (HPC)

All over the process of treating data on HPC Systems, parallel file systems play a significant role. With more and more applications, the need for high performance Input-Output is rising. Different possibilities exist: G...

Towards Development of Real-Time Handwritten Urdu Character to Speech Conversion System for Visually Impaired

Text to Speech (TTS) Conversion Systems have been an area of research for decades and have been developed for both handwritten and typed text in various languages. Existing research shows that it has been a challenging t...

Robust Fuzzy-Second Order Sliding Mode based Direct Power Control for Voltage Source Converter

This paper focuses on a second order sliding mode based direct power controller (SOSM-DPC) of a three-phase grid-connected voltage source converter (VSC). The proposed control scheme combined with fuzzy logic aims at reg...

Download PDF file
  • EP ID EP133486
  • DOI 10.14569/IJACSA.2016.070518
  • Views 113
  • Downloads 0

How To Cite

Harry Doubleday, Leandros Maglaras, Helge Janicke (2016). SSH Honeypot: Building, Deploying and Analysis. International Journal of Advanced Computer Science & Applications, 7(5), 117-121. https://europub.co.uk./articles/-A-133486