Work place: Andhra University CS&SE, Visakhapatnam, 530003, India
E-mail: psavadhani.csse@auce.edu.in
Website:
Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Information Security, Network Security, Data Structures and Algorithms
Biography
Dr. P. S. Avadhani is a professor in the department of Computer Science and systems Engineering of Andhra University. He did his Masters Degree and PhD from IIT, Kanpur. He has guided 15 Ph. D Scholars from various institutes. He received many honors and he has been the member for many expert committees, member of Board of Studies for various universities, Resource person etc for various organizations. He is a Life Member in CSI, AMTI, ISIAM, ISTE, YHAI and in the International Society on Education Technology. He is also a Member of IEEE, and a Member in AICT. He has published about 200 refereed scientific papers. His research areas include Cryptography, Data Security, Algorithms, and Computer Graphics, Digital Forensics and Cyber Security. He has supervised the dissertations of 15 doctoral students. Invited by Microsoft Corporation to Malaysia to attend a conference on .Net Technologies, June 2004. He served as member of National Board of Accreditation of AICTE and inspected various Engineering Colleges all over India as a member of NBA. Delivered Invited talks at many National and International Conferences, Chaired many sessions at National and International Conferences at many places in India and abroad.
By Solomon Z. Melese P.S. Avadhani
DOI: https://doi.org/10.5815/ijcnis.2016.09.03, Pub. Date: 8 Sep. 2016
Honeypots are effective network security systems built to study the tactics of attackers and their intents. In this paper, we deployed Kippo honeypot to analyze Secure Shell attacks. Both the dictionary attack and intrusion activities of attackers have been discussed. We collected usernames and passwords that are attempted by dictionary attack targeting Secure Shell service. We have traced the frequently attacking machines based on their IP addresses. We have also recorded the commands they executed after successful logins to the Secure Shell honeypot server. We logged vast amount of connection requests destined to number of ports originated from different locations of the world. From our honeypot system, we have collected attack data that enables us to learn common Secure Shell based attacks.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals