Fast Network-Based Brute-Force Detection

被引:0
|
作者
Koch, Robert [1 ]
Rodosek, Gabi Dreo [1 ]
机构
[1] Univ Bundeswehr, Inst Tech Informat, Neubiberg, Germany
来源
EIGHTH ADVANCED INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (AICT 2012) | 2012年
关键词
force; intrusion detection; network-based; similarity; inherent knowledge;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Today, the Internet is a crucial business factor for most companies. Different traditional business divisions like distance selling or money transfers enhanced or even switched to the Internet, others emerged directly from it and a billion dollar business evolved over the past years. Therefore, the high fiscal values are alluring criminals. Attacks with the aid of the Internet can be executed from a safe distance, different (or even missing) IT laws in different countries are hampering the transboundary criminal execution. For example, brute-force attacks to gain access to systems and servers are still a popular and successful attack type. After gaining access, sensitive data can be copied, spyware can be installed, etc. Current protection mechanisms require extensive administration or can reduce network performance. Therefore, we propose a new architecture for network-based brute-force detection in encrypted environments. The system evaluates the similarity of the network packet payload-sizes of different connections. No information about the encryption in use or the functionality of the authorization process is required. Based on the high similarity of rejected connections, an identification of bruteforce attacks is realized.
引用
收藏
页码:184 / 190
页数:7
相关论文
共 50 条
  • [1] Network Log-Based SSH Brute-Force Attack Detection Model
    Park, Jeonghoon
    Kim, Jinsu
    Gupta, B. B.
    Park, Namje
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 887 - 901
  • [2] BRUTE-FORCE SEARCH OF FAST CONVOLUTION ALGORITHMS
    Haynal, Steve
    Haynal, Heidi
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 2586 - 2590
  • [3] Network Coding Delay: A Brute-Force Analysis
    Nistor, Maricica
    Barros, Joao
    Vieira, Fausto
    Vinhoza, Tiago T. V.
    Widmer, Joerg
    2010 INFORMATION THEORY AND APPLICATIONS WORKSHOP (ITA), 2010, : 39 - 43
  • [4] Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic
    Wichmann, Pascal
    Marx, Matthias
    Federrath, Hannes
    Fischer, Mathias
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [5] A BRUTE-FORCE POLARIZED PROTON TARGET AS AN APPLICATION OF A VERSATILE BRUTE-FORCE POLARIZATION FACILITY
    AURES, R
    HEERINGA, W
    KLAGES, HO
    MASCHUW, R
    SCHMIDT, FK
    ZEITNITZ, B
    NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION A-ACCELERATORS SPECTROMETERS DETECTORS AND ASSOCIATED EQUIPMENT, 1984, 224 (03): : 347 - 354
  • [6] An efficient brute-force solution to the network reconfiguration problem
    Morton, AB
    Mareels, IMY
    IEEE TRANSACTIONS ON POWER DELIVERY, 2000, 15 (03) : 996 - 1000
  • [7] No rationality through brute-force
    Dantas, Danilo Fraga
    FILOSOFIA UNISINOS, 2017, 18 (03): : 195 - 200
  • [9] Flow-Based Web Application Brute-Force Attack and Compromise Detection
    Hofstede, Rick
    Jonker, Mattijs
    Sperotto, Anna
    Pras, Aiko
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2017, 25 (04) : 735 - 758
  • [10] Flow-Based Web Application Brute-Force Attack and Compromise Detection
    Rick Hofstede
    Mattijs Jonker
    Anna Sperotto
    Aiko Pras
    Journal of Network and Systems Management, 2017, 25 : 735 - 758