Fast Network-Based Brute-Force Detection

被引:0
|
作者
Koch, Robert [1 ]
Rodosek, Gabi Dreo [1 ]
机构
[1] Univ Bundeswehr, Inst Tech Informat, Neubiberg, Germany
来源
EIGHTH ADVANCED INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (AICT 2012) | 2012年
关键词
force; intrusion detection; network-based; similarity; inherent knowledge;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Today, the Internet is a crucial business factor for most companies. Different traditional business divisions like distance selling or money transfers enhanced or even switched to the Internet, others emerged directly from it and a billion dollar business evolved over the past years. Therefore, the high fiscal values are alluring criminals. Attacks with the aid of the Internet can be executed from a safe distance, different (or even missing) IT laws in different countries are hampering the transboundary criminal execution. For example, brute-force attacks to gain access to systems and servers are still a popular and successful attack type. After gaining access, sensitive data can be copied, spyware can be installed, etc. Current protection mechanisms require extensive administration or can reduce network performance. Therefore, we propose a new architecture for network-based brute-force detection in encrypted environments. The system evaluates the similarity of the network packet payload-sizes of different connections. No information about the encryption in use or the functionality of the authorization process is required. Based on the high similarity of rejected connections, an identification of bruteforce attacks is realized.
引用
收藏
页码:184 / 190
页数:7
相关论文
共 50 条
  • [31] Protecting financial institutions from brute-force attacks
    Herley, Cormac
    Florencio, Dinei
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 681 - 685
  • [32] PUMP CONTROLS FINESSE BRUTE-FORCE DESIGN.
    Bagat, Arjun
    Orban, Paul
    Hydraulics and Pneumatics, 1985, 38 (05): : 53 - 56
  • [33] A New Fuzzy Vault based Biometric System Robust to Brute-Force Attack
    Abiega-L'Eglisse, Alfonso Francisco De
    Otero, Mario Rosas
    Hernandez, Vladimir Azpeitia
    Gallegos-Garcia, Gina
    Nakano-Miyatake, Mariko
    COMPUTACION Y SISTEMAS, 2022, 26 (03): : 1151 - 1165
  • [34] InfinityGauntlet: Brute-force Attack on Smartphone Fingerprint Authentication
    Chen, Yu
    Yu, Yang
    Zhai, Lidong
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2027 - 2041
  • [35] A Semi Brute-Force Search Approach for (Balanced) Clustering
    Yicheng Xu
    Vincent Chau
    Chenchen Wu
    Yong Zhang
    Vassilis Zissimopoulos
    Yifei Zou
    Algorithmica, 2024, 86 : 130 - 146
  • [36] Honey Encryption Encryption beyond the Brute-Force Barrier
    Juels, Ari
    Ristenpart, Thomas
    IEEE SECURITY & PRIVACY, 2014, 12 (04) : 59 - 62
  • [37] A Semi Brute-Force Search Approach for (Balanced) Clustering
    Xu, Yicheng
    Chau, Vincent
    Wu, Chenchen
    Zhang, Yong
    Zissimopoulos, Vassilis
    Zou, Yifei
    ALGORITHMICA, 2024, 86 (01) : 130 - 146
  • [38] BAL: A library for the brute-force analysis of dynamical systems
    Linaro, Daniele
    Storace, Marco
    COMPUTER PHYSICS COMMUNICATIONS, 2016, 201 : 126 - 134
  • [39] A New Distributed Brute-Force Password Cracking Technique
    Tirado, Emanuel
    Turpin, Brendan
    Beltz, Cody
    Roshon, Phillip
    Judge, Rylin
    Gagneja, Kanwal
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2018, 2018, 878 : 117 - 127
  • [40] SINGULAR EXTENSIONS - ADDING SELECTIVITY TO BRUTE-FORCE SEARCHING
    ANANTHARAMAN, T
    CAMPBELL, MS
    HSU, FH
    ARTIFICIAL INTELLIGENCE, 1990, 43 (01) : 99 - 109