>
> Analyzing malicious SSH login attempts
> By Christian Seifert
> 2006-09-11
>
> Malicious SSH login attempts have been appearing in some
> administrators'
> logs for several years. This article takes a new look at the use of
> honeypots to analyze malicious SSH login attempts and see what can be
> learned about this activity. The article then offers
> recommendations on
> how to secure one's system against these attacks.
>
> http://www.securityfocus.com/infocus/1876
>