Wikipedia:Articles for deletion/Kippo

From Wikipedia, the free encyclopedia
The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.

The result was no consensus. Sandstein 16:23, 13 December 2021 (UTC)[reply]

Kippo[edit]

Kippo (edit | talk | history | protect | delete | links | watch | logs | views) – (View log | edits since nomination)
(Find sources: Google (books · news · scholar · free images · WP refs· FENS · JSTOR · TWL)

Lacks secondary sourcing. Loafiewa (talk) 03:22, 22 November 2021 (UTC)[reply]

  • Note: This discussion has been included in the list of Computing-related deletion discussions. Loafiewa (talk) 03:22, 22 November 2021 (UTC)[reply]
  • Comment I'm conflicted on this one. It's no longer under development, but there seems to be quite a bit of discussion of it in information security circles, and it's the parent of several active forks that do seem to be notable. However, the sources discussing it are mostly blogs that individually would have trouble meeting WP:RS. PianoDan (talk) 19:21, 22 November 2021 (UTC)[reply]
  • Comment maybe its best to redirect the article from Kippo to Cowrie, which is basically the continuation of Kippo source code (a fork (software development). --Neo139 (talk) 17:15, 24 November 2021 (UTC)[reply]

Relisted to generate a more thorough discussion and clearer consensus.
Please add new comments below this notice. Thanks, Daniel (talk) 00:56, 29 November 2021 (UTC)[reply]

  • Comment I'm conflicted because I think we have a duty to our readers to write in plain English and not geek-speak. What's a "medium-interaction SSH honeypot"? A very quiet thing where Winnie-the-Pooh spends a bit of time but not too much? Unless either the article can explain what such a thing is, or blue-link to somewhere else that does, it's just telling those who know, what they already know. Elemimele (talk) 17:13, 29 November 2021 (UTC)[reply]

Relisted to generate a more thorough discussion and clearer consensus.
Please add new comments below this notice. Thanks, Extraordinary Writ (talk) 07:49, 6 December 2021 (UTC)[reply]

  • Keep, passes WP:GNG due to being discussed in multiple reliable, independent, secondary sources.[1][2][3][4]

References

  1. ^ Valli, Craig; Rabadia, Priya; Woodward, Andrew (2013). Patterns and patter - an investigation into SSH activity using kippo honeypots. Australian Digital Forensics Conference.
  2. ^ Melese, S.Z.; Avadhani, P.S. (2016). "Honeypot system for attacks on SSH protocol" (pdf). International Journal of Computer Network and Information Security. 8 (9): 19. doi:10.5815/ijcnis.2016.09.03.
  3. ^ Anil Goel; Sanjay Misra; Shampa Chakraverty, eds. (2018). "Secure Shell (SSH) Traffic Analysis". Towards Extensible and Adaptable Methods in Computing. Springer Singapore. p. 113. ISBN 9789811323485.
  4. ^ Sanders, Chris; Smith, Jason (2013). Applied Network Security Monitoring; Collection, Detection, and Analysis. Elsevier Science. pp. 329–332. ISBN 9780124172166.

SailingInABathTub (talk) 22:40, 6 December 2021 (UTC)[reply]

The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.