Cite this paper
nullY. Su, G. Chung and B. Wu, "Developing the Upgrade Detection and Defense System of SSH Dictionary-Attack for Multi-Platform Environment," iBusiness
, Vol. 3 No. 1, 2011, pp. 65-70. doi: 10.4236/ib.2011.31011
 S. Garfinkel, G. Spafford. “Practical UNIX and Internet Security (3rd Ed.),” O’Reilly Media, 2003.
 U.S.G.A.O. “Continued Federal Efforts Are Needed to Protect Critical Systems and Information,” 2009.
 S. Christey and R. Martin, “Common Weakness Enumeration. Vulnerability Type Distributions in CVE,” May 22, 2007. Internet Available: http://cwe.mitre.org/docume
 SANS Institute. “SANS Top-20 2007 Security Risks(2007 Annual Update)”, 2007. Internet Available: http://www.san
 J. Owens and J. Matthews, “A Study of Passwords and Methods Used in Brute-Force Ssh Attacks,” Technical Report, Department of Computer Science, Clarkson University, 2008.
 S. William, “Stallings: Network Security Essentials:Applications and Standards 2/E”, Pearson, 2005.
 Y. N. Su and Y. H. Chen, ”Block Online Password Guessing Attacks to a SSH Service with Analyzing System Log Files,” Journal of Computer Science and Application, Vol. 5, No. 2, December 2009, pp.108-122.
 Y. J. Hsueh, “A Study of Using NetFlow Traffic Data to Detect and Track SSH Dictionary Attack,” Master Thesis, Department of Asia-Pacific Industrial and Business Management, National University of Kaohsiung, Taiwan, 2009.
 Y. N. Su, Y. H. Chen, G. H. Chung and B. J. H. Wu, “Developing a SSH Dictionary Attack Defense System in the Multi Platform Environment through the Analyzing Log”. International Conference on Internet Technology and Applications, China, 2010.
 R. Corin, J. Doumen and S. Etalle, “Analysing Password Protocol Security Against Off-Line Dictionary Attacks,” Electronic Notes in Theoretical Computer Science, Vol. 121, No. 4, 2005, pp. 47-63.
 D. M. Tsai, “Bird’s Linux: Basic Learning”, GrandTech, 2003.
 R. Wichmann, “Defending against Brute Force Ssh Attacks”, 2008. Internet Available: http://la-samhna.de/library/brutessh.html
 S. Shit, “The SSH/FTP Brute Force Blocker,” 2010, Internet Available: http://anp.ath.cx/sshit/
 V. Goyal, et al., “A New Protocol to Counter Online Dictionary Attacks,” Computers & Security, Vol. 25, No. 2, 2006, pp. 114-120. doi:10.1016/j.cose.2005.09.003