Detecting SSH identity theft in HPC cluster environments using Self-organizing maps
Many of the attacks on computing clusters and grids have been performed by using stolen authentication passwords and unprotected SSH keys, therefore there is a need for a system that can detect intruders masquerading as ordinary users. Our assumption is that an attacker behaves significantly differe...
Main Author: | Leufvén, Claes |
---|---|
Format: | Others |
Language: | English |
Published: |
Linköpings universitet, Institutionen för systemteknik
2006
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-6818 |
Similar Items
-
Threats of identity theft in cyberspace - case study
by: Wojciech Jakubiec
Published: (2020-06-01) -
Towards a framework for securing a business against electronic identity theft
by: Bechan, Upasna
Published: (2009) -
Towards a framework for securing a business against electronic identity theft
by: Bechan, Upasna
Published: (2009) -
Mining of identity theft stories to model and assess identity threat behaviors
by: Yang, Yongpeng
Published: (2014) -
Electricity Theft Detection in AMI Based on Clustering and Local Outlier Factor
by: Yanlin Peng, et al.
Published: (2021-01-01)