≡ Menu

How to Analyzing malicious SSH login attempts and secure the system

Using honeypot you can monitor and learn more about malicious SSH login.

From the article:
Malicious SSH login attempts have been appearing in some administrators' logs for several years. This article revisits the use of honeypots to analyze malicious SSH login attempts and see what can be learned about this activity. The article then offers recommendations on how to secure one's system against these attacks.

Read more at securityfocus...

Tweet itFacebook itGoogle+ itPDF itFound an error/typo on this page?

{ 1 comment… add one }

  • RJ Nunnally March 2, 2015, 12:38 am

    A honeypot isn’t even needed – an active web server with logging enabled seems to attract *plenty* of malicious login attempts. Provided the server is hardened well enough to avoid compromise, this may yield more accurate results than a honeypot that many adversaries recognize.

Leave a Comment