- document
-
Ghiette, V.D.H. (author), Griffioen, H.J. (author), Dörr, C. (author)In SSH brute forcing attacks, adversaries try a lot of different username and password combinations in order to compromise a system. As such activities are easily recognizable in log files, sophisticated adversaries distribute brute forcing attacks over a large number of origins. Effectively finding such distributed campaigns proves however...conference paper 2019