Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach

Over the last two decades (2000–2020), the Internet has rapidly evolved, resulting in symmetrical and asymmetrical Internet consumption patterns and billions of users worldwide. With the immense rise of the Internet, attacks and malicious behaviors pose a huge threat to our computing environment. Br...

Full description

Bibliographic Details
Main Authors: Abel Z. Agghey, Lunodzo J. Mwinuka, Sanket M. Pandhare, Mussa A. Dida, Jema D. Ndibwile
Format: Article
Language:English
Published: MDPI AG 2021-11-01
Series:Symmetry
Subjects:
Online Access:https://www.mdpi.com/2073-8994/13/11/2192