A Flow-Level Taxonomy and Prevalence of Brute Force Attacks

被引:0
|
作者
Vykopal, Jan [1 ]
机构
[1] Masaryk Univ, Inst Comp Sci, Brno 60200, Czech Republic
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Online brute force and dictionary attacks against network services and web applications are ubiquitous. We present their taxonomy from the perspective of network flows. This contributes to clear evaluation of detection methods and provides better understanding of the brute force attacks within the research community. Next, we utilize the formal definitions of attacks in a long-term analysis of SSH traffic from 10 gigabit university network. The results shows that flow-based intrusion detection may profit from traffic observation of the whole network, particularly it can allow more accurate detection of the majority of brute-force attacks in high-speed networks.
引用
收藏
页码:666 / 675
页数:10
相关论文
共 50 条
  • [31] CAUDIT: Continuous Auditing of SSH Servers to Mitigate Brute-Force Attacks
    Cao, Phuong M.
    Wu, Yuming
    Banerjee, Subho S.
    Azoff, Justin
    Withers, Alexander
    Kalbarczyk, Zbigniew T.
    Iyer, Ravishankar K.
    [J]. PROCEEDINGS OF THE 16TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, 2019, : 667 - 682
  • [32] Universal Randomized Guessing With Application to Asynchronous Decentralized Brute-Force Attacks
    Merhav, Neri
    Cohen, Asaf
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (01) : 114 - 129
  • [33] A Statistical Analysis of Large Passwords Lists, Used to Optimize Brute Force Attacks
    van Heerden, Renier Pelser
    Vorster, Johannes
    [J]. 4TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 111 - 128
  • [34] Universal Randomized Guessing with Application to Asynchronous Decentralized Brute-Force Attacks
    Merhav, Neri
    Cohen, Asaf
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 485 - 489
  • [35] AN ALGORITHM FOR GENERATING DIGITAL WATERMARKS ROBUST AGAINST BRUTE-FORCE ATTACKS
    Mitekin, V. A.
    [J]. COMPUTER OPTICS, 2015, 39 (05) : 808 - 817
  • [36] A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks
    Byun, Hyeonsu
    Kim, Jueun
    Jeong, Yunseok
    Seok, Byoungjin
    Gong, Seonghyeon
    Lee, Changhoon
    [J]. ELECTRONICS, 2024, 13 (13)
  • [37] Flow-Level QoE of Video Streaming in Wireless Networks
    Xu, Yuedong
    Elayoubi, Salah Eddine
    Altman, Eitan
    El-Azouzi, Rachid
    Yu, Yinghao
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2016, 15 (11) : 2762 - 2780
  • [38] Scheduling in Multichannel Wireless Networks with Flow-Level Dynamics
    Liu, Shihuan
    Ying, Lei
    Srikant, R.
    [J]. SIGMETRICS 2010: PROCEEDINGS OF THE 2010 ACM SIGMETRICS INTERNATIONAL CONFERENCE ON MEASUREMENT AND MODELING OF COMPUTER SYSTEMS, 2010, 38 (01): : 191 - 202
  • [39] On the Design of Irregular HetNets with Flow-Level Traffic Dynamics
    Shojaeifard, Arman
    Hamdi, Khairi Ashour
    Alsusa, Emad
    So, Daniel K. C.
    Wong, Kai-Kit
    [J]. 2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2016,
  • [40] SubFlow: Towards Practical Flow-Level Traffic Classification
    Xie, Guowu
    Iliofotou, Marios
    Keralapura, Ram
    Faloutsos, Michalis
    Nucci, Antonio
    [J]. 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2541 - 2545