Abstract
Honeypots are a proven technology for network defence and forensics. This paper focuses on attacks directed to network devices that utilise SSH services. The research uses the SSH honeypot Kippo to gather data about attacks on the SSH service. Kippo uses python and SSL to generate mock SSH services and also provides a filesystem honeypot for attackers to interact with. The preliminary research has found that attacks of this type are manifest, have a variety of profiles and may be launched from a variety of platforms.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Andersson, K., Szewczyk, P.: Insecurity By Obscurity Continues: Are ADSL Router Manuals Putting End-Users At Risk. In: Williams, T., Valli, C. (eds.) The 9th Australian Information Security Management Conference, Citigate Hotel, Perth, Western Australia, Secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 19-24 (2011)
Szewczyk, P.: ADSL Router Forensics Part 2: Acquiring Evidence. In: The 7th Australian Digital Forensics Conference, Kings Hotel, Perth, Western Australia, Secau - Security Research Centre, School of Computer and Security Science, Edith Cowan University, Perth, Western Australia (2009)
Szewczyk, P.: Analysis of Data Remaining on Second Hand ADSL Routers. Journal of Digital Forensics, Security and Law 6(3), 17–30 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Valli, C. (2012). SSH – Somewhat Secure Host. In: Xiang, Y., Lopez, J., Kuo, CC.J., Zhou, W. (eds) Cyberspace Safety and Security. CSS 2012. Lecture Notes in Computer Science, vol 7672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35362-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-35362-8_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35361-1
Online ISBN: 978-3-642-35362-8
eBook Packages: Computer ScienceComputer Science (R0)