SSH Honeypot: Building, Deploying and Analysis

Date

2016-05

Advisors

Journal Title

Journal ISSN

ISSN

2156-5570
2158-107X

Volume Title

Publisher

SAI Organisation

Type

Article

Peer reviewed

Yes

Abstract

This article is set to discuss the various techniques that can be used while developing a honeypot, of any form, while considering the advantages and disadvantages of these very different methods. The foremost aims are to cover the principles of the Secure Shell (SSH), how it can be useful and more importantly, how attackers can gain access to a system by using it. The article involved the development of multiple low interaction honeypots. The low interaction honeypots that have been developed make use of the highly documented libssh and even editing the source code of an already available SSH daemon. Finally the aim is to combine the results with the vastly distributed Kippo honeypot, in order to be able to compare and contrast the results along with usability and necessity of particular features. Providing a clean and simple description for less knowledgeable users to be able to create and deploy a honeypot of production quality, adding security advantages to their network instantaneously.

Description

Keywords

honeypot, Secure Shell, Cyber Security

Citation

Doubleday, H., Maglaras, L.and Janicke, H. (2016) SSH Honeypot: Building, Deploying and Analysis. International Journal of Advanced Computer Science and Applications,

Rights

Research Institute