Realtime Risk Monitoring of SSH Brute Force Attacks

被引:3
|
作者
Fahrnberger, Guenter [1 ]
机构
[1] Univ Hagen, Hagen, North Rhine Wes, Germany
关键词
Brute force attack; Monitoring; Nagios; Pattern detection; Risk monitoring; Secure Shell; SSH; Supervision; Surveillance;
D O I
10.1007/978-3-031-06668-9_8
中图分类号
学科分类号
摘要
The Secure Shell (SSH) has served for years as the primary protocol to securely control networked remote devices. In particular, administrators of Linux and, to an increasing degree, also Windows operating systems with powerful rights capitalize on the speed and convenience of SSH. Consequentially, villains zero in on acquiring these mighty privileges, preferably by attempting a myriad of credentials until success or exhaustion. All known pertinent scientific resources limit themselves to compiling descriptive statistics or detecting such brute force attacks. The reviewed articles and papers neglect that each penetration attempt implies a differing hazard for an aim. This contribution bridges the gap by surveying relevant academical material and elaborating the blind spot of monitoring the risk of SSH brute force attacks in realtime. Beyond that, this document formally verifies the hazardously raised likeliness of SSH brute force attacks that knowingly or unwittingly use the same patterns as the passwords of their targets. Based on that, it presents a viable solution with a Condition Monitoring System (CMS) that monitors SSH brute force attacks and assesses their jeopardy in real time.
引用
收藏
页码:75 / 95
页数:21
相关论文
共 50 条
  • [1] Detecting SSH and FTP Brute Force Attacks in Big Data
    Hancock, John
    Khoshgoftaar, Taghi M.
    Leevy, Joffrey L.
    [J]. 20TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2021), 2021, : 760 - 765
  • [2] Hidden Markov Model Modeling of SSH Brute-Force Attacks
    Sperotto, Anna
    Sadre, Ramin
    de Boer, Pieter-Tjerk
    Pras, Aiko
    [J]. INTEGRATED MANAGEMENT OF SYSTEMS, SERVICES, PROCESSES AND PEOPLE IN IT, PROCEEDINGS, 2009, 5841 : 164 - 176
  • [3] Detection of SSH Brute Force Attacks Using Aggregated Netflow Data
    Najafabadi, Maryam M.
    Khoshgoftaar, Taghi M.
    Calvert, Chad
    Kemp, Clifford
    [J]. 2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, : 283 - 288
  • [4] CAUDIT: Continuous Auditing of SSH Servers to Mitigate Brute-Force Attacks
    Cao, Phuong M.
    Wu, Yuming
    Banerjee, Subho S.
    Azoff, Justin
    Withers, Alexander
    Kalbarczyk, Zbigniew T.
    Iyer, Ravishankar K.
    [J]. PROCEEDINGS OF THE 16TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, 2019, : 667 - 682
  • [5] Data Analytics for Modeling and Visualizing Attack Behaviors: A Case Study on SSH Brute Force Attacks
    Yao, Chengchao
    Luo, Xiao
    Zincir-Heywood, A. Nur
    [J]. 2017 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2017, : 3573 - 3580
  • [6] SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches
    Hossain, Md Delwar
    Ochiai, Hideya
    Doudou, Fall
    Kadobayashi, Youki
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2020), 2020, : 491 - 497
  • [7] Brute force attacks on hash functions
    Laccetti, G.
    Schmid, G.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (03): : 439 - 460
  • [8] Keypad against brute force attacks on smartphones
    Kim, I.
    [J]. IET INFORMATION SECURITY, 2012, 6 (02) : 71 - 76
  • [9] Deep Learning-based Intrusion Detection: A Novel Approach for Identifying Brute-Force Attacks on FTP and SSH Protocol
    Alotibi, Noura
    Alshammari, Majid
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 107 - 111
  • [10] Detecting Brute-Force Attacks on Cryptocurrency Wallets
    Kiktenko, E. O.
    Kudinov, M. A.
    Fedorov, A. K.
    [J]. BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2019, 2019, 373 : 232 - 242