Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach

Over the last two decades (2000–2020), the Internet has rapidly evolved, resulting in symmetrical and asymmetrical Internet consumption patterns and billions of users worldwide. With the immense rise of the Internet, attacks and malicious behaviors pose a huge threat to our computing environment. Br...

Full description

Saved in:
Bibliographic Details
Main Authors: Abel Z. Agghey, Lunodzo J. Mwinuka, Sanket M. Pandhare, Mussa A. Dida, Jema D. Ndibwile
Format: article
Language:EN
Published: MDPI AG 2021
Subjects:
SSH
Online Access:https://doaj.org/article/9c763430fd354a42aa6617531e7082cc
Tags: Add Tag
No Tags, Be the first to tag this record!