Active and Passive Collection of SSH key material for cyber threat intelligence

04/11/2022
by   Alexandre Dulaunoy, et al.
0

This paper describes a system for storing historical forensic artefacts collected from SSH connections. This system exposes a REST API in a similar fashion as passive DNS databases, malware hash registries, and SSL notaries with the goal of supporting incident investigations and monitoring of infrastructure.

READ FULL TEXT
research
06/20/2020

MALOnt: An Ontology for Malware Threat Intelligence

Malware threat intelligence uncovers deep information about malware, thr...
research
09/10/2022

GITCBot: A Novel Approach for the Next Generation of C&C Malware

Online Social Networks (OSNs) attracted millions of users in the world. ...
research
12/19/2017

Passive ans Active Observation: Experimetal Design Issues in Big Data

Data can be collected in scientific studies via a controlled experiment ...
research
12/19/2017

Passive ans Active Observation: Experimental Design Issues in Big Data

Data can be collected in scientific studies via a controlled experiment ...
research
12/19/2017

Passive and Active Observation: Experimental Design Issues in Big Data

Data can be collected in scientific studies via a controlled experiment ...
research
05/19/2022

Disentangling Active and Passive Cosponsorship in the U.S. Congress

In the U.S. Congress, legislators can use active and passive cosponsorsh...
research
06/28/2023

Design and Evaluation of the JSI-KneExo: Active, Passive, Pneumatic, Portable Knee Exoskeleton

This paper presents a portable stand-alone pneumatic knee exoskeleton th...

Please sign up or login with your details

Forgot password? Click here to reset