Analyzing the Attack Pattern of Brute Force Attack on SSH Port

SUBHAN, AHMAD and Yesi Novaria, Kunang and Ilman Zuhri, Yadi (2023) Analyzing the Attack Pattern of Brute Force Attack on SSH Port. Analyzing the Attack Pattern of Brute Force Attack on SSH Port.

[img] Text
Analyzing_the_Attack_Pattern_of_Brute_Force_Attack_on_SSH_Port.pdf

Download (653kB)

Abstract

Cyberattacks are one of the threats in the world of technology. Various kinds of cyberattacks can be a threat to information security. One example of a cyberattack is a brute force attack. The attacker breaks into the system by using various login usernames and passwords. It is necessary to analyze cyberattacks using honeypot to prevent and improve information security from existing cyberattacks. This research aims to analyze the Brute Force Attack Pattern on SSH Port by utilizing a honeypot. This research collected attacks on the SSH port captured by the honeypot server. Visualization logs were created from the honeypot logs to observe the patterns of attacks that targeted the SSH port. We utilized visualization tools like Tableau and Metabase to analyze the attack patterns. The research uses action research methodology to analyze how to prevent attacks. The research results revealed the most exploited usernames and passwords by hackers, analyzed the IP and identified the command patterns that hackers most exploited. We provided recommendations to mitigate the attacks based on these attack patterns.

Item Type: Article
Subjects: T Technology > T Technology (General)
Depositing User: Yesi Novaria Kunang
Date Deposited: 15 Apr 2025 08:31
Last Modified: 15 Apr 2025 08:31
URI: http://repository.binadarma.ac.id/id/eprint/9014

Actions (login required)

View Item View Item