Classification of SSH anomalous connections

4Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Secure Shell Protocol (SSH) is a well-known standard protocol for remote login and used as well for other secure network services over an insecure network. It is mainly used for remotely accessing shell accounts on Unix-liked operating systems to perform administrative tasks. For this reason, the SSH service has been for years an attractive target for attackers, aiming to guess root passwords performing dictionary attacks, or to directly exploit the service itself. To test the classification performance of different classifiers and combinations of them, this study gathers and analyze SSH data coming from a honeynet and then it is analysed by means of a wide range of classifiers. The high-rate classification results lead to positive conclusions about the identification of malicious SSH connections.

Cite

CITATION STYLE

APA

González, S., Sedano, J., Zurutuza, U., Ezpeleta, E., Martínez, D., Herrero, Á., & Corchado, E. (2014). Classification of SSH anomalous connections. In Advances in Intelligent Systems and Computing (Vol. 239, pp. 479–488). Springer Verlag. https://doi.org/10.1007/978-3-319-01854-6_49

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free