Machine Learning for Detecting Brute Force Attacks at the Network Level

@article{Najafabadi2014MachineLF,
  title={Machine Learning for Detecting Brute Force Attacks at the Network Level},
  author={Maryam M. Najafabadi and Taghi M. Khoshgoftaar and Clifford Kemp and Naeem Seliya and Richard Zuech},
  journal={2014 IEEE International Conference on Bioinformatics and Bioengineering},
  year={2014},
  pages={379-385}
}
The tremendous growth in computer network and Internet usage, combined with the growing number of attacks makes network security a topic of serious concern. One of the most prevalent network attacks that can threaten computers connected to the network is brute force attack. In this work we investigate the use of machine learners for detecting brute force attacks (on the SSH protocol) at the network level. We base our approach on applying machine learning algorithms on a newly generated dataset… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 16 CITATIONS

Utilizing Machine Learning Classifiers to Identify SSH Brute Force Attacks

James Deverick, Mary
  • 2019
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Detecting Brute-Force Attack in IoT Device using Network Flow Data

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Fingerprinting Tooling used for SSH Compromisation Attempts

Vincent Ghiëtte, Harm Griffioen, Christian Doerr
  • RAID
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

Network-based Classification of Authentication Attempts using Machine Learning

  • 2019 International Conference on Computing, Networking and Communications (ICNC)
  • 2019
VIEW 3 EXCERPTS
CITES METHODS & BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 11 REFERENCES

Lessons learned from the deployment of a high-interaction honeypot

  • 2006 Sixth European Dependable Computing Conference
  • 2006
VIEW 12 EXCERPTS
HIGHLY INFLUENTIAL

Detecting stealthy, distributed SSH brute-forcing

  • ACM Conference on Computer and Communications Security
  • 2013
VIEW 1 EXCERPT

Experimental Study of Dictionary Attacks on SSH

R. Bezut, V. Bernet-Rollande
  • Technical report, University of Technology of Compiegne, 2010.
  • 2010
VIEW 1 EXCERPT

SSH Dictionary Attack and DNS Reverse Resolution Traffic in Campus Network

  • 2010 Third International Conference on Intelligent Networks and Intelligent Systems
  • 2010
VIEW 1 EXCERPT

Network-Based Dictionary Attack Detection

  • 2009 International Conference on Future Networks
  • 2009

The WEKA data mining software: an update

  • SIGKDD Explorations
  • 2009
VIEW 2 EXCERPTS

Visually) Tracking Distributed SSH BruteForce Attacks

E. L. Malecot, Y. Hori, K. Sakurai, J. Ryou, H. Lee
  • In 3rd International Joint Workshop on Information Security and Its Applications, 2008.
  • 2008
VIEW 1 EXCERPT

Profiling Attacker Behavior Following SSH Compromises

  • 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07)
  • 2007
VIEW 1 EXCERPT

Analyzing Malicious SSH Login Attempts

C. Seifert
  • http://www.symantec.com/connect/articles/analyzingmalicious-ssh-login-attempts. [Accessed 2006].
  • 2006
VIEW 1 EXCERPT