Wikipedia:Articles for deletion/Kippo

Source: Wikipedia, the free encyclopedia.
The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.

The result was no consensus. Sandstein 16:23, 13 December 2021 (UTC)[reply]

Kippo (edit | talk | history | protect | delete | links | watch | logs | views) – (View log | edits since nomination)
(Find sources: Google (books · news · scholar · free images · WP refs· FENS · JSTOR · TWL)

Lacks secondary sourcing. Loafiewa (talk) 03:22, 22 November 2021 (UTC)[reply]

Relisted to generate a more thorough discussion and clearer consensus.
Please add new comments below this notice. Thanks, Daniel (talk) 00:56, 29 November 2021 (UTC)[reply]

  • Comment I'm conflicted because I think we have a duty to our readers to write in plain English and not geek-speak. What's a "medium-interaction SSH honeypot"? A very quiet thing where Winnie-the-Pooh spends a bit of time but not too much? Unless either the article can explain what such a thing is, or blue-link to somewhere else that does, it's just telling those who know, what they already know. Elemimele (talk) 17:13, 29 November 2021 (UTC)[reply]

Relisted to generate a more thorough discussion and clearer consensus.
Please add new comments below this notice. Thanks, Extraordinary Writ (talk) 07:49, 6 December 2021 (UTC)[reply]

  • Keep, passes WP:GNG due to being discussed in multiple reliable, independent, secondary sources.[1][2][3][4]

References

  1. ^ Valli, Craig; Rabadia, Priya; Woodward, Andrew (2013). Patterns and patter - an investigation into SSH activity using kippo honeypots. Australian Digital Forensics Conference.
  2. ^ Melese, S.Z.; Avadhani, P.S. (2016). "Honeypot system for attacks on SSH protocol" (pdf). International Journal of Computer Network and Information Security. 8 (9): 19. doi:10.5815/ijcnis.2016.09.03.
  3. ^ Anil Goel; Sanjay Misra; Shampa Chakraverty, eds. (2018). "Secure Shell (SSH) Traffic Analysis". Towards Extensible and Adaptable Methods in Computing. Springer Singapore. p. 113. ISBN 9789811323485.
  4. ^ Sanders, Chris; Smith, Jason (2013). Applied Network Security Monitoring; Collection, Detection, and Analysis. Elsevier Science. pp. 329–332. ISBN 9780124172166.

SailingInABathTub (talk) 22:40, 6 December 2021 (UTC)[reply]

The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.