Self-adaptive SSH Honeypot Model Capable of Reasoning


The increased number of SSH stolen credentials on the " black market " used for targeted attacks proves the opportunity of SSH Honeypots. Corroborated with recent trends in honeypot research area regarding self-adaptive systems, capable of interacting with attackers on their own, leads us to the necessity of self-adaptive SSH Honeypots. Several Artificial… (More)

4 Figures and Tables


  • Presentations referencing similar topics