Detection of SSH Brute Force Attacks Using Aggregated Netflow Data

被引:17
|
作者
Najafabadi, Maryam M. [1 ]
Khoshgoftaar, Taghi M. [1 ]
Calvert, Chad [1 ]
Kemp, Clifford [1 ]
机构
[1] Florida Atlantic Univ, Boca Raton, FL 33431 USA
来源
2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA) | 2015年
基金
美国国家科学基金会;
关键词
Intrusion Detection; Brute Force; Machine Learning; Aggregated Netflows; INTRUSION DETECTION;
D O I
10.1109/ICMLA.2015.20
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The SSH Brute force attack is one of the most prevalent attacks in computer networks. These attacks aim to gain ineligible access to users' accounts by trying plenty of different password combinations. The detection of this type of attack at the network level can overcome the scalability issue of host-based detection methods. In this paper, we provide a machine learning approach for the detection of SSH brute force attacks at the network level. Since extracting discriminative features for any machine learning task is a fundamental step, we explain the process of extracting discriminative features for the detection of brute force attacks. We incorporate domain knowledge about SSH brute force attacks as well as the analysis of a representative collection of the data to define the features. We collected real SSH traffic from a campus network. We also generated some failed login data that a legitimate user who has forgotten his/her password can produce as normal traffic that can be similar to the SSH brute force attack traffic. Our inspection on the collected brute force Netflow data and the manually produced SSH failed login data showed that the Netflow features are not discriminative enough to discern brute force traffic from the failed login traffic produced by a legitimate user. We introduced an aggregation of Netflows to extract the proper features for building machine learning models. Our results show that the models built upon these features provide excellent performances for the detection of brute force attacks.
引用
收藏
页码:283 / 288
页数:6
相关论文
共 50 条
  • [1] Detecting SSH and FTP Brute Force Attacks in Big Data
    Hancock, John
    Khoshgoftaar, Taghi M.
    Leevy, Joffrey L.
    20TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2021), 2021, : 760 - 765
  • [2] Realtime Risk Monitoring of SSH Brute Force Attacks
    Fahrnberger, Guenter
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2022, 2022, 1585 : 75 - 95
  • [3] Hidden Markov Model Modeling of SSH Brute-Force Attacks
    Sperotto, Anna
    Sadre, Ramin
    de Boer, Pieter-Tjerk
    Pras, Aiko
    INTEGRATED MANAGEMENT OF SYSTEMS, SERVICES, PROCESSES AND PEOPLE IN IT, PROCEEDINGS, 2009, 5841 : 164 - 176
  • [4] Data Analytics for Modeling and Visualizing Attack Behaviors: A Case Study on SSH Brute Force Attacks
    Yao, Chengchao
    Luo, Xiao
    Zincir-Heywood, A. Nur
    2017 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2017, : 3573 - 3580
  • [5] Refined Detection of SSH Brute-Force Attackers Using Machine Learning
    Hynek, Karel
    Benes, Tomas
    Cejka, Tomas
    Kubatova, Hana
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2020, 2020, 580 : 49 - 63
  • [6] SSH Compromise Detection using NetFlow/IPFIX
    Hofstede, Rick
    Hendriks, Luuk
    Sperotto, Anna
    Pras, Aiko
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (05) : 21 - 26
  • [7] SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches
    Hossain, Md Delwar
    Ochiai, Hideya
    Doudou, Fall
    Kadobayashi, Youki
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2020), 2020, : 491 - 497
  • [8] CAUDIT: Continuous Auditing of SSH Servers to Mitigate Brute-Force Attacks
    Cao, Phuong M.
    Wu, Yuming
    Banerjee, Subho S.
    Azoff, Justin
    Withers, Alexander
    Kalbarczyk, Zbigniew T.
    Iyer, Ravishankar K.
    PROCEEDINGS OF THE 16TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, 2019, : 667 - 682
  • [9] Bloom Filter-Based Realtime Risk Monitoring of SSH Brute Force Attacks
    Fahrnberger, Guenter
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2023, 2023, 1876 : 48 - 67
  • [10] Public Review for SSH Compromise Detection using NetFlow/IPFIX
    Ballani, Hitesh
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (05) : 20 - 20