A Flow-Level Taxonomy and Prevalence of Brute Force Attacks

被引:0
|
作者
Vykopal, Jan [1 ]
机构
[1] Masaryk Univ, Inst Comp Sci, Brno 60200, Czech Republic
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Online brute force and dictionary attacks against network services and web applications are ubiquitous. We present their taxonomy from the perspective of network flows. This contributes to clear evaluation of detection methods and provides better understanding of the brute force attacks within the research community. Next, we utilize the formal definitions of attacks in a long-term analysis of SSH traffic from 10 gigabit university network. The results shows that flow-based intrusion detection may profit from traffic observation of the whole network, particularly it can allow more accurate detection of the majority of brute-force attacks in high-speed networks.
引用
收藏
页码:666 / 675
页数:10
相关论文
共 50 条
  • [1] Machine Learning for Detecting Brute Force Attacks at the Network Level
    Najafabadi, Maryam M.
    Khoshgoftaar, Taghi M.
    Kemp, Clifford
    Seliya, Naeem
    Zuech, Richard
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOENGINEERING (BIBE), 2014, : 379 - 385
  • [2] Brute force attacks on hash functions
    Laccetti, G.
    Schmid, G.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (03): : 439 - 460
  • [3] Keypad against brute force attacks on smartphones
    Kim, I.
    [J]. IET INFORMATION SECURITY, 2012, 6 (02) : 71 - 76
  • [4] Detection of HTTPS Brute-Force Attacks with Packet-Level Feature Set
    Luxemburk, Jan
    Hynek, Karel
    Cejka, Tomas
    [J]. 2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 114 - 122
  • [5] A new metric for flow-level filtering of low-rate DDoS attacks
    Simsek, Mehmet
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3815 - 3825
  • [6] Detecting Brute-Force Attacks on Cryptocurrency Wallets
    Kiktenko, E. O.
    Kudinov, M. A.
    Fedorov, A. K.
    [J]. BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2019, 2019, 373 : 232 - 242
  • [7] Realtime Risk Monitoring of SSH Brute Force Attacks
    Fahrnberger, Guenter
    [J]. INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2022, 2022, 1585 : 75 - 95
  • [8] The effectiveness of brute force attacks on RC4
    Couture, N
    Kent, KB
    [J]. SECOND ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, PROCEEDINGS, 2004, : 333 - 336
  • [9] Privacy Against Brute-Force Inference Attacks
    Osia, Seyed Ali
    Rassouli, Borzoo
    Haddadi, Hamed
    Rabiee, Hamid R.
    Gunduz, Deniz
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 637 - 641
  • [10] Flow-level models for multipath routing
    Lilienthal, Sarah
    Mandjes, Michel
    [J]. PERFORMANCE EVALUATION, 2011, 68 (07) : 551 - 574