Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,166,817 papers from all fields of science
Search
Sign In
Create Free Account
Kippo
Kippo is a medium-interaction SSH honeypot written in Python. Kippo is used to log brute force attacks and the entire shell interaction performed by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Conch (SSH)
Python
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Honeypot Cowrie Implementation to Protect SSH Protocol in Ubuntu Server with Visualisation Using Kippo-Graph
Devi Afriyantari Puspa Putri
International Journal of Advanced Trends in…
2019
Corpus ID: 213659186
Server in computer system aim to provide service which used in computer network. However, servers susceptible to security attack…
Expand
2018
2018
Honeypot Utilization for Network Intrusion Detection
Simo Kemppainen
,
T. Kovanen
2018
Corpus ID: 65632024
For research purposes, a honeypot is a system that enables observing attacker’s actions in different phases of a cyberattack. In…
Expand
2015
2015
Static and dynamic malware behavioral analysis based on arm based board
Utkarsh Saxena
,
Om Prakash Bachhan
,
R. Majumdar
International Conference on Computing for…
2015
Corpus ID: 13056081
A trap set to detect attempts at unauthorized use of information systems. But setting up these honeypots and keep these guzzling…
Expand
2015
2015
Analisis dan Implementasi Honeypot Menggunakan Kippo sebagai Penunjang Keamanan Jaringan
Tri Handoyo Saputro
2015
Corpus ID: 215891910
Honeypot merupakan sebuah sistem yang di bangun menyerupai dengan sistem yang sesungguhnya dengan tujuan agar para attacker…
Expand
2015
2015
Testing simple deceptive honeypot tools
Aymen Yahyaoui
,
N. Rowe
Defense + Security Symposium
2015
Corpus ID: 118346728
Deception can be a useful defensive technique against cyber-attacks; it has the advantage of unexpectedness to attackers and…
Expand
2015
2015
An investigation of the current situation regarding SSH related attacks by the use of Kippo honeypots
Erik Josefsson
,
Mattues Mattson
2015
Corpus ID: 113451213
This report investigated the current situation regarding attacks targeting the SSH protocol. The study included Kippo SSH…
Expand
2015
2015
Enhanced analysis of kippo-honeypot in cloud
Mohammed Abdullah Omar Alzubaidi
2015
Corpus ID: 112442784
Cloud computing is a promising technology for business and individuals. Cloud computing allows companies to focus more on their…
Expand
2015
2015
How to build a honeypot System in the cloud
M. Lihet
,
V. Dădârlat
14th RoEduNet International Conference…
2015
Corpus ID: 19880977
This article will explain and will act as a guide to implement a cloud based honeypot using the Kippo honeypot application suite…
Expand
2014
2014
Radical vinylation of dioxolanes and N-acylpyrrolidines using vinyl bromides
Takashi Kippo
,
Y. Kimura
,
A. Maeda
,
H. Matsubara
,
T. Fukuyama
,
I. Ryu
2014
Corpus ID: 94804483
Radical vinylation was investigated using vinyl bromides with an electron-withdrawing substituent at the β-position. The…
Expand
2014
2014
Finding evidence of wordlists being deployed against SSH Honeypots - implications and impacts
Priya Rabadia
,
C. Valli
2014
Corpus ID: 55204812
This paper is an investigation focusing on activities detected by three SSH honeypots that utilise Kippo honeypot software. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE