A flow-based detection method for stealthy dictionary attacks against Secure Shell

Journal of Information Security and Applications - Tập 21 - Trang 31-41 - 2015
Akihiro Satoh1, Yutaka Nakamura1, Takeshi Ikenaga1
1kyushu institute of technology, 1-1 Sensui-cho, Tobata-ku, Kitakyushu-shi, Fukuoka, Japan

Tài liệu tham khảo

Alsaleh, 2012, Revisiting defenses against large-scale online password guessing attacks, IEEE Trans on Dependable and Secure Computing, 9, 128, 10.1109/TDSC.2011.24 Asai, 2011, Traffic causality graphs: profiling network applications through temporal and spatial causality of flows, 95 BlockHosts, http://www.aczoom.com/tools/blockhosts/. BruteForceBlocker, http://danger.rulez.sk/projects/bruteforceblocker/. Daigle, 2004 DenyHOSTS, http://denyhosts.sourceforge.net/. Goyal, 2006, A new protocol to counter online dictionary attacks, J Computers & Security, 25, 114, 10.1016/j.cose.2005.09.003 Guha, 2011, A Streaming statistical algorithm for detection of SSH keystroke packets in TCP connections, 73 Jain, 1999, Data clustering: a review, ACM Computing Surv, 31, 264, 10.1145/331499.331504 Kojoney, http://kojoney.sourceforge.net/. Moore, 2005 Owens, 2008 Ramsbrock, 2007, Profiling Attacker behavior following SSH compromises, 119 SANS Internet Storm Center, https://isc.sans.edu/diary/Distributed+SSH+Brute+Force+Attempts+on+the+rise+again/9031. Satoh, 2012, SSH dictionary attack detection based on flow analysis, 51 Song, 2001, Timing analysis of keystrokes and timing attacks on SSH, 25 Sperotto, 2009, Hidden markov model modeling of SSH Brute-Force attacks, Lecture Notes in Computer Science, 5841, 164, 10.1007/978-3-642-04989-7_13 Sperotto, 2010, An overview of IP flow-based intrusion detection, IEEE Commun Surv and Tutor, 12, 343, 10.1109/SURV.2010.032210.00054 SSHBLACK, http://sshblack.com. SSHGuard, http://www.sshguard.net/. Su, 2011, Developing the upgrade detection and defense system of SSH dictionary-attack for multi-platform environment, J iBusiness, 3, 65, 10.4236/ib.2011.31011 Takemori, 2009, Detection of NS resource record DNS resolution traffic, host search, and SSH dictionary attack activities, International Journal of Intelligent Engineering and Systems, 2, 35, 10.22266/ijies2009.1231.05 TeraTerm, http://sourceforge.jp/projects/ttssh2/. Thames, 2008, A distributed Active response architecture for preventing SSH dictionary attacks, 84 THC-Hydra, http://www.thc.org/thc-hydra/. Torgerson, 1952, Multidimensional Scaling: I. Theory and method, J Psychometrika, 17, 401, 10.1007/BF02288916 Tshark, http://www.wireshark.org/. Ward, 1963, Hierarchical grouping to optimize an objective function, J Amer Statist Assoc, 58, 236, 10.1080/01621459.1963.10500845 Wegman, 1972, Nonparametric probability density estimation, J Statist Comput Simulation, 1, 225, 10.1080/00949657208810017 Wright, 2006, Using visual motifs to classify encrypted traffic, 41 Ylonen, 2006 Ylonen, 2006 Ylonen, 2006