Analysis of SSH attacks of Darknet using Honeypots
- Shaik Bhanu
- Girish Khilari
- Varun Kumar
honeypot systems; ssh; security Analysis
A Darknet is a private network and the connections are made only between trusted friends. In the field of computer security, honeypot is an internet attached server that acts as a decoy, to trap the hackers in order to study their activities and monitor how they are able to break into a system. In this paper we present the results of SSH honeypot operations in which it undertook the web trap of attackers who target SSH service in order to gain illegal services. A medium interaction honeypot offers a high interaction level to the attacker and when a connection attempt is made to system port, the honeypot can reply back with specially crafted packets that emulate of a real network services. The fake system has remained online and fully operational, capturing attacks and logging all malicious activity. Lastly we collect the data and analyzed the information.
Shaik Bhanu, Girish Khilari, Varun Kumar. "Analysis of SSH attacks of Darknet using Honeypots".INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH ISSN:2321-9939, Vol.3, Issue 1, pp.348-350, URL :https://rjwave.org/ijedr/papers/IJEDR1501064.pdf
Volume 3 Issue 1
Pages. 348-350