Hornyák, Olivér (2022) Protection against remote desktop attacks. PRODUCTION SYSTEMS AND INFORMATION ENGINEERING, 10 (3). pp. 31-39. ISSN 1785-1270
|
Text
1974-Article Text-9012-1-10-20230619.pdf - Published Version Download (445kB) | Preview |
Abstract
This paper overviews the most common malicious software types. The motivation of writing this paper was a real word case study that had to be investigated. A computer was suspected to have had an unwanted remote desktop connection attack. This paper presents how to investigate the event log artifacts. For the unfortunate case when such an attack is proved to have happened, the second part of the article describes a method that allows the system administrator to detect brute force attacks through the remote desktop connection. When such an attack was revealed, the attacker’s IP address can be blacklisted.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | computer, security |
Subjects: | Q Science / természettudomány > QA Mathematics / matematika > QA76 Computer software / programozás |
Depositing User: | Anita Agárdi |
Date Deposited: | 25 Nov 2024 08:28 |
Last Modified: | 25 Nov 2024 08:28 |
URI: | https://real.mtak.hu/id/eprint/210248 |
Actions (login required)
![]() |
Edit Item |