Distribution of Invalid Users on an SSH Server
Rasmus Kai, Kokkonen Tero, Hämäläinen Timo. (2024). Distribution of Invalid Users on an SSH Server. In Á. Rocha, H. Adeli, G. Dzemyda, F. Moreira, & A. Poniszewska-Marańda (Eds.), WorldCIST 2024 : Good Practices and New Perspectives in Information Systems and Technologies (985, pp. 139-151). Springer. Lecture Notes in Networks and Systems. https://doi.org/10.1007/978-3-031-60227-6_12
Published in
Lecture Notes in Networks and SystemsEditors
Date
2024Access restrictions
Embargoed until: 2025-05-16Request copy from author
Copyright
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
The Secure Shell (SSH) server on a Unix-like system is a viable way for users to login and execute programs on the system remotely. Remote access is something that hackers also want to achieve, making SSH servers a target for attack. A quantitative study was made of the distribution of usernames and IP addresses in failed login usernames on a publicly available SSH server. The failed logins and IP addresses were ranked according to the number of occurrences producing a distribution. The results indicated that the elements followed approximately a distribution with an inverse relationship with the rank of the element similar to what is known as the Zipf’s Law. An important consequence of the Zipf’s law is that 20% of elements are responsible for 80% of consequences, which means that by blocking 20% of the failed login usernames or IP addresses, 80% or more of the failed logins are also blocked. This was found to be true for a real-world scenario. Some topics were identified for further research.
...
Publisher
SpringerParent publication ISBN
978-3-031-60226-9Conference
World Conference on Information Systems and TechnologiesIs part of publication
WorldCIST 2024 : Good Practices and New Perspectives in Information Systems and TechnologiesISSN Search the Publication Forum
2367-3370Keywords
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/213737577
Metadata
Show full item recordCollections
Additional information about funding
This research was partially funded by the Resilience of Modern Value Chains in a Sustainable Energy System project, co-funded by the European Union and the Regional Council of Central Finland (grant number J10052).License
Related items
Showing items with similar title or keywords.
-
Distributed denial-of-service attacks in the Internet
Penttinen, Tuomo (2005) -
Indeksit ja niiden käyttö MySQL- ja SQL Server -tietokantatuotteissa
Lusua, Janne (2009)Lusua, Janne Petteri Indeksit ja niiden käyttö MySQL- ja SQL Server -tietokantatuotteissa / Janne Lusua Jyväskylä: Jyväskylän yliopisto, 2009 35 s. Kandidaatintutkielma Tietokantojen koon yhä kasvaessa on syntynyt tarve ... -
Scalability and extensibility in client-independent server architectures
Poutanen, Mikko (2005)In this research we are inspecting the client-independent server software architectures and their two most important quality aspects, scalability and extensibility. By client-independent server software architecture we ... -
High availability quality attributes for EAI Server architecture
Paunisaari, Juha (2009) -
Real-time audio servers on BSD Unix derivatives
Erkkilä, Juha (2005)