Fast Network-Based Brute-Force Detection

被引:0
|
作者
Koch, Robert [1 ]
Rodosek, Gabi Dreo [1 ]
机构
[1] Univ Bundeswehr, Inst Tech Informat, Neubiberg, Germany
来源
EIGHTH ADVANCED INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (AICT 2012) | 2012年
关键词
force; intrusion detection; network-based; similarity; inherent knowledge;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Today, the Internet is a crucial business factor for most companies. Different traditional business divisions like distance selling or money transfers enhanced or even switched to the Internet, others emerged directly from it and a billion dollar business evolved over the past years. Therefore, the high fiscal values are alluring criminals. Attacks with the aid of the Internet can be executed from a safe distance, different (or even missing) IT laws in different countries are hampering the transboundary criminal execution. For example, brute-force attacks to gain access to systems and servers are still a popular and successful attack type. After gaining access, sensitive data can be copied, spyware can be installed, etc. Current protection mechanisms require extensive administration or can reduce network performance. Therefore, we propose a new architecture for network-based brute-force detection in encrypted environments. The system evaluates the similarity of the network packet payload-sizes of different connections. No information about the encryption in use or the functionality of the authorization process is required. Based on the high similarity of rejected connections, an identification of bruteforce attacks is realized.
引用
收藏
页码:184 / 190
页数:7
相关论文
共 50 条
  • [41] Hidden Markov Model Modeling of SSH Brute-Force Attacks
    Sperotto, Anna
    Sadre, Ramin
    de Boer, Pieter-Tjerk
    Pras, Aiko
    INTEGRATED MANAGEMENT OF SYSTEMS, SERVICES, PROCESSES AND PEOPLE IN IT, PROCEEDINGS, 2009, 5841 : 164 - 176
  • [42] Smart brute-force approach for distribution feeder reconfiguration problem
    Parlier, Guillaume
    Gueguen, Herve
    Hu, Feihu
    ELECTRIC POWER SYSTEMS RESEARCH, 2019, 174
  • [43] Systolic parallel architecture for brute-force autoregressive signal modeling
    Alwan, Nuha A. S.
    COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (04) : 1358 - 1366
  • [44] LHC physicists embrace brute-force approach to particle hunt
    Davide Castelvecchi
    Nature, 2018, 560 (7718) : 293 - 294
  • [45] SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches
    Hossain, Md Delwar
    Ochiai, Hideya
    Doudou, Fall
    Kadobayashi, Youki
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2020), 2020, : 491 - 497
  • [46] Local search for string problems: Brute-force is essentially optimal
    Guo, Jiong
    Hermelin, Danny
    Komusiewicz, Christian
    THEORETICAL COMPUTER SCIENCE, 2014, 525 : 30 - 41
  • [47] Towards Data-Driven Characterization of Brute-Force Attackers
    Wilkens, Florian
    Fischer, Mathias
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [48] A brute-force method for studying the chromatic properties of homeomorphic graphs
    Read, Ronald C.
    ARS COMBINATORIA, 2010, 96 : 425 - 457
  • [49] Brute-Force k-Nearest Neighbors Search on the GPU
    Li, Shengren
    Amenta, Nina
    SIMILARITY SEARCH AND APPLICATIONS, SISAP 2015, 2015, 9371 : 259 - 270
  • [50] REPRESENTATION DESIGN AND BRUTE-FORCE INDUCTION IN A BOEING MANUFACTURING DOMAIN
    RIDDLE, P
    SEGAL, R
    ETZIONI, O
    APPLIED ARTIFICIAL INTELLIGENCE, 1994, 8 (01) : 125 - 147