A Flow-Level Taxonomy and Prevalence of Brute Force Attacks

被引:0
|
作者
Vykopal, Jan [1 ]
机构
[1] Masaryk Univ, Inst Comp Sci, Brno 60200, Czech Republic
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Online brute force and dictionary attacks against network services and web applications are ubiquitous. We present their taxonomy from the perspective of network flows. This contributes to clear evaluation of detection methods and provides better understanding of the brute force attacks within the research community. Next, we utilize the formal definitions of attacks in a long-term analysis of SSH traffic from 10 gigabit university network. The results shows that flow-based intrusion detection may profit from traffic observation of the whole network, particularly it can allow more accurate detection of the majority of brute-force attacks in high-speed networks.
引用
收藏
页码:666 / 675
页数:10
相关论文
共 50 条
  • [21] A Flow-Level Architecture for Balancing Accountability and Privacy
    Ma, Yuxiang
    Wu, Yulei
    Ge, Jingguo
    Li, Jun
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 984 - 989
  • [22] IoT Lotto: Utilizing IoT Devices in Brute-Force Attacks
    Alani, Mohammed M.
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 140 - 144
  • [23] Adaptive flow-level scheduling for the IoT MAC
    Sharma, Pragya
    Nair, Jayakrishnan
    Singh, Raman
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [24] Dimensioning of data networks: a flow-level perspective
    Lassila, Pasi
    Penttinen, Aleksi
    Virtamo, Jorma
    [J]. EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2009, 20 (06): : 549 - 563
  • [25] Estimating Bandwidth Requirements Using Flow-Level Measurements
    Schmidt, Ricardo de O.
    Pras, Aiko
    [J]. MANAGING THE DYNAMICS OF NETWORKS AND SERVICES, 2011, 6734 : 169 - 172
  • [26] On the Flow-level Dynamics of a Packet-switched Network
    Moallemi, Ciamac
    Shah, Devavrat
    [J]. SIGMETRICS 2010: PROCEEDINGS OF THE 2010 ACM SIGMETRICS INTERNATIONAL CONFERENCE ON MEASUREMENT AND MODELING OF COMPUTER SYSTEMS, 2010, 38 (01): : 83 - 94
  • [27] Interference coordination in wireless networks: a flow-level perspective
    Combes, Richard
    Altman, Zwi
    Altman, Eitan
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2841 - 2849
  • [28] Flow-level multipath load balancing in MPLS network
    Zhao, ZH
    Shu, YT
    Zhang, LF
    Yang, O
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (05) : 2015 - 2022
  • [29] Mitigating Brute-force Attacks on Bloom-filter Based Forwarding
    Alzahrani, Bander A.
    Vassilakis, Vassilios G.
    Reed, Martin J.
    [J]. 2013 CONFERENCE ON FUTURE INTERNET COMMUNICATIONS (CFIC), 2013,
  • [30] Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization
    Salamatian, Salman
    Huleihel, Wasim
    Beirami, Ahmad
    Cohen, Asaf
    Medard, Muriel
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (09) : 2288 - 2299