Back to Search
Start Over
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique: Analysis of SSH AND TELNET Honeypot
- Source :
- 2021 6th International Conference on Computer Science and Engineering (UBMK).
- Publication Year :
- 2021
- Publisher :
- IEEE, 2021.
-
Abstract
- Generally, the defense measures taken against new cyber-attack methods are insufficient for cybersecurity risk management. Contrary to classical attack methods, the existence of undiscovered attack types called’ zero-day attacks’ can invalidate the actions taken. It is possible with honeypot systems to implement new security measures by recording the attacker’s behavior. The purpose of the honeypot is to learn about the methods and tools used by the attacker or malicious activity. In particular, it allows us to discover zero-day attack types and develop new defense methods for them. Attackers have made protocols such as SSH (Secure Shell) and Telnet, which are widely used for remote access to devices, primary targets. In this study, SSHTelnet honeypot was established using Cowrie software. Attackers attempted to connect, and attackers record their activity after providing access. These collected attacker log records and files uploaded to the system are published on Github to other researchers1. We shared the observations and analysis results of attacks on SSH and Telnet protocols with honeypot.
Details
- Database :
- OpenAIRE
- Journal :
- 2021 6th International Conference on Computer Science and Engineering (UBMK)
- Accession number :
- edsair.doi...........4f2ae2ac3ae174922bf36166178f8dd0