An in-depth analysis of SSH attacks on Amazon EC2