Show simple item record

dc.contributor.authorRasmus Kai
dc.contributor.authorKokkonen Tero
dc.contributor.authorHämäläinen Timo
dc.contributor.editorRocha, Álvaro
dc.contributor.editorAdeli, Hojjat
dc.contributor.editorDzemyda, Gintautas
dc.contributor.editorMoreira, Fernando
dc.contributor.editorPoniszewska-Marańda, Aneta
dc.date.accessioned2024-06-06T06:25:50Z
dc.date.available2024-06-06T06:25:50Z
dc.date.issued2024
dc.identifier.citationRasmus Kai, Kokkonen Tero, Hämäläinen Timo. (2024). Distribution of Invalid Users on an SSH Server. In Á. Rocha, H. Adeli, G. Dzemyda, F. Moreira, & A. Poniszewska-Marańda (Eds.), <i>WorldCIST 2024 : Good Practices and New Perspectives in Information Systems and Technologies</i> (985, pp. 139-151). Springer. Lecture Notes in Networks and Systems. <a href="https://doi.org/10.1007/978-3-031-60227-6_12" target="_blank">https://doi.org/10.1007/978-3-031-60227-6_12</a>
dc.identifier.otherCONVID_213737577
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/95573
dc.description.abstractThe Secure Shell (SSH) server on a Unix-like system is a viable way for users to login and execute programs on the system remotely. Remote access is something that hackers also want to achieve, making SSH servers a target for attack. A quantitative study was made of the distribution of usernames and IP addresses in failed login usernames on a publicly available SSH server. The failed logins and IP addresses were ranked according to the number of occurrences producing a distribution. The results indicated that the elements followed approximately a distribution with an inverse relationship with the rank of the element similar to what is known as the Zipf’s Law. An important consequence of the Zipf’s law is that 20% of elements are responsible for 80% of consequences, which means that by blocking 20% of the failed login usernames or IP addresses, 80% or more of the failed logins are also blocked. This was found to be true for a real-world scenario. Some topics were identified for further research.en
dc.format.extent228
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofWorldCIST 2024 : Good Practices and New Perspectives in Information Systems and Technologies
dc.relation.ispartofseriesLecture Notes in Networks and Systems
dc.rightsIn Copyright
dc.titleDistribution of Invalid Users on an SSH Server
dc.typeconference paper
dc.identifier.urnURN:NBN:fi:jyu-202406064333
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-3-031-60226-9
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange139-151
dc.relation.issn2367-3370
dc.relation.volume985
dc.type.versionacceptedVersion
dc.rights.copyright© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
dc.rights.accesslevelembargoedAccessfi
dc.type.publicationconferenceObject
dc.relation.conferenceWorld Conference on Information Systems and Technologies
dc.subject.ysohakkerit
dc.subject.ysotietoverkot
dc.subject.ysoetäkäyttö
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p22619
jyx.subject.urihttp://www.yso.fi/onto/yso/p12936
jyx.subject.urihttp://www.yso.fi/onto/yso/p20557
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-031-60227-6_12
jyx.fundinginformationThis research was partially funded by the Resilience of Modern Value Chains in a Sustainable Energy System project, co-funded by the European Union and the Regional Council of Central Finland (grant number J10052).
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright