Indian Journal of Science and Technology
Year: 2013, Volume: 6, Issue: 12, Pages: 1-12
Esmaeil Kheirkhah1 , Sayyed Mehdi Poustchi Amin2*, Hediyeh AmirJahanshahi Sistani2 and Haridas Acharya3
1 Department of Computer Engineering, [email protected]
2 Department of Computer Studies and Research, [email protected]
3 Allana Institute of Management Science, [email protected]
*Author For Correspondence
Sayyed Mehdi Poustchi Amin
epartment of Computer Studies and Research,
Email: [email protected]
We studied Brute-force SSH attacks carried out on six different universities campus networks by using Honeypot Techniques. Brute-force password guessing attacks against SSH, FTP and telnet servers are the most common form of attack to compromise servers facing the internet. A key factor to avoid disruption of these networks is to defend it against Brute-force attacks. We focused on the attempts to gain remote access to our SSH Honeypots Plus Tools and techniques employed. There are striking similarities in the methods used to attack these dissimilar systems. The evidence shows that, pre-compiled lists of usernames and passwords that are widely shared form the basis for brute-force attacks. When the passwords were analysed, it was found that in the event of actual malicious traffic what was commonly understood to be strong password did not protect the systems from being compromised. The data from the study were used to evaluate the efficacy of a variety of techniques designed to defend the systems against these attacks. Table 17 lists some commonly recommendation for the protection of SSH servers.
Keywords: Honeypot, Honeynet, Internet Attacks, Network Security, SSH, Brute-force, Malware.
Subscribe now for latest articles and news.