Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach

Over the last two decades (2000–2020), the Internet has rapidly evolved, resulting in symmetrical and asymmetrical Internet consumption patterns and billions of users worldwide. With the immense rise of the Internet, attacks and malicious behaviors pose a huge threat to our computing environment. Br...

Description complète

Enregistré dans:
Détails bibliographiques
Auteurs principaux: Abel Z. Agghey, Lunodzo J. Mwinuka, Sanket M. Pandhare, Mussa A. Dida, Jema D. Ndibwile
Format: article
Langue:EN
Publié: MDPI AG 2021
Sujets:
SSH
Accès en ligne:https://doaj.org/article/9c763430fd354a42aa6617531e7082cc
Tags: Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!