REAL

Protection against remote desktop attacks

Hornyák, Olivér (2022) Protection against remote desktop attacks. PRODUCTION SYSTEMS AND INFORMATION ENGINEERING, 10 (3). pp. 31-39. ISSN 1785-1270

[img]
Preview
Text
1974-Article Text-9012-1-10-20230619.pdf - Published Version

Download (445kB) | Preview

Abstract

This paper overviews the most common malicious software types. The motivation of writing this paper was a real word case study that had to be investigated. A computer was suspected to have had an unwanted remote desktop connection attack. This paper presents how to investigate the event log artifacts. For the unfortunate case when such an attack is proved to have happened, the second part of the article describes a method that allows the system administrator to detect brute force attacks through the remote desktop connection. When such an attack was revealed, the attacker’s IP address can be blacklisted.

Item Type: Article
Uncontrolled Keywords: computer, security
Subjects: Q Science / természettudomány > QA Mathematics / matematika > QA76 Computer software / programozás
Depositing User: Anita Agárdi
Date Deposited: 25 Nov 2024 08:28
Last Modified: 25 Nov 2024 08:28
URI: https://real.mtak.hu/id/eprint/210248

Actions (login required)

Edit Item Edit Item