Distribution of Invalid Users on an SSH Server

Author:

Rasmus Kai,Kokkonen Tero,Hämäläinen Timo

Publisher

Springer Nature Switzerland

Reference23 articles.

1. Ylönen, T.: SSH-secure login connections over the Internet. In: Proceedings of the 6th USENIX Security Symposium (1996)

2. Dusi, M., Gringoli, F., Salgarelli, L.: A preliminary look at the privacy of SSH tunnels. In: Proceedings of the 17th International Conference on Computer Communications and Networks, August 2008

3. Owens, J., Mathews, J.: A study of passwords and methods in brute-force SSH attacks. In: USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), (2008)

4. Raikar, M.M., Meena, S.M.: SSH brute force attack mitigation in internet of things (IoT) network: an edge device security measure. In: 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) (2021)

5. Wanjau, S.K., Wambugu, G.M., Gabriel, N.K.: SSH-brute force attack detection model based on deep learning. Int. J. Comput. Appl. Technol. Res. 10, 42–50 (2021)

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3