Searched for: author%3A%22Griffioen%2C+H.J.%22
(1 - 1 of 1)
document
Ghiette, V.D.H. (author), Griffioen, H.J. (author), Dörr, C. (author)
In SSH brute forcing attacks, adversaries try a lot of different username and password combinations in order to compromise a system. As such activities are easily recognizable in log files, sophisticated adversaries distribute brute forcing attacks over a large number of origins. Effectively finding such distributed campaigns proves however...
conference paper 2019