profile of attacker behavior following a remote compromise. For this experiment, we utilized
four Linux honeypot computers running SSH with easily guessable passwords. During the
course of our research, we also determined the most commonly attempted usernames and
passwords, the average number of attempted logins per day, and the ratio of failed to
successful attempts. To build a profile of attacker behavior, we looked for specific actions …