Detection of username enumeration attack on ssh protocol: Machine learning approach

AZ Agghey, LJ Mwinuka, SM Pandhare, MA Dida… - Symmetry, 2021 - mdpi.com
Over the last two decades (2000–2020), the Internet has rapidly evolved, resulting in
symmetrical and asymmetrical Internet consumption patterns and billions of users …

Usability and security analysis of the keepkey wallet

E Almutairi, S Al-Megren - 2019 IEEE International Conference …, 2019 - ieeexplore.ieee.org
This paper presents an investigation of the usability and security of the hardware wallet
KeepKey 4.2. 10. A Man-in-the-Middle (MITM) attack was implemented to simulate potential …

Oh SSH-it, What's My Fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS

S Neef, N Wisiol - International Conference on Cryptology and Network …, 2022 - Springer
The SSH protocol is commonly used to access remote systems on the Internet, as it provides
an encrypted and authenticated channel for communication. If upon establishing a new …

Detection and prevention of username enumeration attack on SSH protocol: machine learning approach

A Agghey - 2022 - dspace.nm-aist.ac.tz
Over the last two decades (2000–2020), the Internet has rapidly evolved, resulting in
symmetrical and asymmetrical Internet consumption patterns and billions of users …