@inproceedings{0f55483c7a7c4863921757bf794a93bf,
title = "Preventing SSH remote attacks using moving target defense",
abstract = "SSH authentication mechanism with a weak password and SSH software vulnerabilities are the two most important ways for remote cyber-attackers to target an SSH server. Knowing the IP address of the SSH server is the first step for these remote attacks. In this research, a new method is presented to use dynamic IP addresses on the SSH server to avoid the server being targeted for SSH attacks. The IP address of the SSH server is changed randomly and dynamically as a Moving Target Defense method to limit an attacker's time to target the server. At the same time, authenticated clients are updated through the use of the Binding Update procedure (standard Mobile IPv6 protocol). Our testbed experiments and scalability tests via simulations show low packet-loss rates that may occur due to the handoff delay.",
author = "Vahid Heydari",
note = "Publisher Copyright: {\textcopyright} 2018 Academic Conferences and Publishing International Limited. All Rights Reserved.; 13th International Conference on Cyber Warfare and Security, ICCWS 2018 ; Conference date: 08-03-2018 Through 09-03-2018",
year = "2018",
language = "English (US)",
series = "Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018",
publisher = "Academic Conferences and Publishing International Limited",
pages = "272--280",
editor = "Hurley, {John S.} and Chen, {Jim Q.}",
booktitle = "Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018",
}