SSHCure: A Flow-Based SSH Intrusion Detection System

被引:0
|
作者
Hellemons, Laurens [1 ]
Hendriks, Luuk [1 ]
Hofstede, Rick [1 ]
Sperotto, Anna [1 ]
Sadre, Ramin [1 ]
Pras, Aiko [1 ]
机构
[1] Univ Twente, Ctr Telemat & Informat Technol CTIT, Fac Elect Engn Math & Comp Sci EEMCS, Design & Anal Commun Syst DACS, NL-7500 AE Enschede, Netherlands
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity. Most existing network intrusion detection systems designed for this purpose rely on the inspection of individual packets and, hence, do not scale to today's high-speed networks. To overcome this issue, this paper proposes SSHCure, a flow-based intrusion detection system for SSH attacks. It employs an efficient algorithm for the real-time detection of ongoing attacks and allows identification of compromised attack targets. A prototype implementation of the algorithm, including a graphical user interface, is implemented as a plugin for the popular NfSen monitoring tool. Finally, the detection performance of the system is validated with empirical traffic data.
引用
收藏
页码:86 / 97
页数:12
相关论文
共 50 条
  • [1] Flow-Based Intrusion Detection System for SDN
    Ajaeiya, Georgi A.
    Adalian, Nareg
    Elhajj, Imad H.
    Kayssi, Ayman
    Chehab, Ali
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 787 - 793
  • [2] Ensemble Learning Approach for Flow-based Intrusion Detection System
    Zwane, Skhumbuzo
    Tarwireyi, Paul
    Adigun, Matthew
    2019 IEEE AFRICON, 2019,
  • [3] Flow-Based Intrusion Detection Systems: A Survey
    Al-Bakaa, Aliaa
    Al-Musawi, Bahaa
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY (ATIS 2021), 2022, 1554 : 121 - 137
  • [4] Flow-based intrusion detection: Techniques and challenges
    Umer, Muhammad Fahad
    Sher, Muhammad
    Bi, Yaxin
    COMPUTERS & SECURITY, 2017, 70 : 238 - 254
  • [5] An Overview of IP Flow-Based Intrusion Detection
    Sperotto, Anna
    Schaffrath, Gregor
    Sadre, Ramin
    Morariu, Cristian
    Pras, Aiko
    Stiller, Burkhard
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (03): : 343 - 356
  • [6] An explainable efficient flow-based Industrial IoT intrusion detection system
    Alani, Mohammed M.
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [7] Flow-based Features for a Robust Intrusion Detection System Targeting Mobile Traffic
    Elrawy, Mohammed Faisal
    Awad, Ali Ismail
    Hamed, Hesham F. A.
    2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2016,
  • [8] Clustering and Neural Visualization for Flow-Based Intrusion Detection
    Sanchez, Raul
    Herrero, Alvaro
    Corchado, Emilio
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 333 - 345
  • [9] A Labeled Data Set for Flow-Based Intrusion Detection
    Sperotto, Anna
    Sadre, Ramin
    van Vliet, Frank
    Pras, Aiko
    IP OPERATIONS AND MANAGEMENT, PROCEEDINGS, 2009, 5843 : 39 - 50
  • [10] Flow-Based Anomaly Intrusion Detection System Using Two Neural Network Stages
    Abuadlla, Yousef
    Kvascev, Goran
    Gajin, Slavko
    Jovanovic, Zoran
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (02) : 601 - 622