Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,178,874 papers from all fields of science
Search
Sign In
Create Free Account
Kippo
Kippo is a medium-interaction SSH honeypot written in Python. Kippo is used to log brute force attacks and the entire shell interaction performed by…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
2 relations
Conch (SSH)
Python
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Honeypot Cowrie Implementation to Protect SSH Protocol in Ubuntu Server with Visualisation Using Kippo-Graph
Devi Afriyantari Puspa Putri
International Journal of Advanced Trends in…
2019
Corpus ID: 213659186
Server in computer system aim to provide service which used in computer network. However, servers susceptible to security attack…
Expand
2018
2018
Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale
Alexander Vetterl
,
R. Clayton
WOOT @ USENIX Security Symposium
2018
Corpus ID: 51829613
The current generation of lowand medium interaction honeypots uses off-the-shelf libraries to provide the transport layer. We…
Expand
2017
2017
Prediction of Attacks Against Honeynet Based on Time Series Modeling
Pavol Sokol
,
Andrej Gajdos
2017
Corpus ID: 67445667
Honeypots are unconventional tools to study methods, tools, and goals of attackers. In addition to IP addresses, these tools…
Expand
2015
2015
Static and dynamic malware behavioral analysis based on arm based board
Utkarsh Saxena
,
Om Prakash Bachhan
,
R. Majumdar
2nd International Conference on Computing for…
2015
Corpus ID: 13056081
A trap set to detect attempts at unauthorized use of information systems. But setting up these honeypots and keep these guzzling…
Expand
Review
2015
Review
2015
An Analysis of Honeypot Programs and the Attack Data Collected
Chris Moore
,
Ameer Al-Nemrat
ICGS3
2015
Corpus ID: 29496095
Honeypots are computers specifically deployed to be a resource that is expected to be attacked or compromised. While the attacker…
Expand
2015
2015
Invited Paper - A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet
C. Valli
,
Priya Rabadia
,
Andrew Woodard
2015
Corpus ID: 4996689
This paper is an investigation focusing on activities detected by SSH honeypots that utilised kippo honeypot software. The…
Expand
2014
2014
Active deception model for securing cloud infrastructure
A. Brzeczko
,
A. Uluagac
,
R. Beyah
,
J. Copeland
IEEE Conference on Computer Communications…
2014
Corpus ID: 18641642
The proliferation of cloud computing over the past several years has led to a variety of new use cases and enabling technologies…
Expand
2014
2014
Radical vinylation of dioxolanes and N-acylpyrrolidines using vinyl bromides
Takashi Kippo
,
Y. Kimura
,
A. Maeda
,
H. Matsubara
,
T. Fukuyama
,
I. Ryu
2014
Corpus ID: 94804483
Radical vinylation was investigated using vinyl bromides with an electron-withdrawing substituent at the β-position. The…
Expand
2013
2013
Patterns and patter - An investigation into SSH activity using Kippo Honeypots
C. Valli
,
Priya Rabadia
,
A. Woodward
2013
Corpus ID: 61361940
This is an investigation of the activity detected on three honeypots that utilise the Kippo SSH honeypot system on VPS servers…
Expand
2011
2011
FREE RADICAL SCAVENGING ACTIVITY OF MANGIFERA INDICA METHANOLIC EXTRACT IN ARTHRITIC RATS
Pathak Nimish
,
Patel Dharmik
,
P. Bhoomika
,
B. Nayana
,
Patel Pinal
2011
Corpus ID: 212513078
Rheumatoid arthritis (RA) is a prevalent and debilitating disease that affects the joints. Infiltration of blood-derived cells in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE