Distribution of Invalid Users on an SSH Server
Rasmus Kai, Kokkonen Tero, Hämäläinen Timo. (2024). Distribution of Invalid Users on an SSH Server. In Á. Rocha, H. Adeli, G. Dzemyda, F. Moreira, & A. Poniszewska-Marańda (Eds.), WorldCIST 2024 : Good Practices and New Perspectives in Information Systems and Technologies (985, pp. 139-151). Springer. Lecture Notes in Networks and Systems. https://doi.org/10.1007/978-3-031-60227-6_12
Julkaistu sarjassa
Lecture Notes in Networks and SystemsToimittajat
Päivämäärä
2024Pääsyrajoitukset
Embargo päättyy: 2025-05-16Pyydä artikkeli tutkijalta
Tekijänoikeudet
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
The Secure Shell (SSH) server on a Unix-like system is a viable way for users to login and execute programs on the system remotely. Remote access is something that hackers also want to achieve, making SSH servers a target for attack. A quantitative study was made of the distribution of usernames and IP addresses in failed login usernames on a publicly available SSH server. The failed logins and IP addresses were ranked according to the number of occurrences producing a distribution. The results indicated that the elements followed approximately a distribution with an inverse relationship with the rank of the element similar to what is known as the Zipf’s Law. An important consequence of the Zipf’s law is that 20% of elements are responsible for 80% of consequences, which means that by blocking 20% of the failed login usernames or IP addresses, 80% or more of the failed logins are also blocked. This was found to be true for a real-world scenario. Some topics were identified for further research.
...
Julkaisija
SpringerEmojulkaisun ISBN
978-3-031-60226-9Konferenssi
World Conference on Information Systems and TechnologiesKuuluu julkaisuun
WorldCIST 2024 : Good Practices and New Perspectives in Information Systems and TechnologiesISSN Hae Julkaisufoorumista
2367-3370Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/213737577
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisätietoja rahoituksesta
This research was partially funded by the Resilience of Modern Value Chains in a Sustainable Energy System project, co-funded by the European Union and the Regional Council of Central Finland (grant number J10052).Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Distributed denial-of-service attacks in the Internet
Penttinen, Tuomo (2005) -
Indeksit ja niiden käyttö MySQL- ja SQL Server -tietokantatuotteissa
Lusua, Janne (2009)Lusua, Janne Petteri Indeksit ja niiden käyttö MySQL- ja SQL Server -tietokantatuotteissa / Janne Lusua Jyväskylä: Jyväskylän yliopisto, 2009 35 s. Kandidaatintutkielma Tietokantojen koon yhä kasvaessa on syntynyt tarve ... -
Scalability and extensibility in client-independent server architectures
Poutanen, Mikko (2005)In this research we are inspecting the client-independent server software architectures and their two most important quality aspects, scalability and extensibility. By client-independent server software architecture we ... -
High availability quality attributes for EAI Server architecture
Paunisaari, Juha (2009) -
Real-time audio servers on BSD Unix derivatives
Erkkilä, Juha (2005)
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.