Detecting SSH identity theft in HPC cluster environments using Self-organizing maps

Many of the attacks on computing clusters and grids have been performed by using stolen authentication passwords and unprotected SSH keys, therefore there is a need for a system that can detect int ...