12th INFORMS Computing Society Conference 2011
DOI: 10.1287/ics.2011.0036
|View full text |Cite
|
Sign up to set email alerts
|

A Streaming Statistical Algorithm for Detection of SSH Keystroke Packets in TCP Connections

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…For example, Goyal et al (Goyal et al, 2006) improved an authentication protocol by adding fast one-way hash functions and challenge-response exchanges, and the protocol j o u r n a l o f i n f o r m a t i o n s e c u r i t y a n d a p p l i c a t i o n s x x x ( 2 0 1 4 ) 1 e1 1 was easy to implement without any infrastructural changes. Several sources (Guha et al, 2011;Song et al, 2001) estimated character strings entered by user's keystrokes. Here keystrokes were a part of typing in an SSH connection except its handshake; hence the algorithms were not applicable for detecting SSH dictionary attacks.…”
Section: Related Workmentioning
confidence: 99%
“…For example, Goyal et al (Goyal et al, 2006) improved an authentication protocol by adding fast one-way hash functions and challenge-response exchanges, and the protocol j o u r n a l o f i n f o r m a t i o n s e c u r i t y a n d a p p l i c a t i o n s x x x ( 2 0 1 4 ) 1 e1 1 was easy to implement without any infrastructural changes. Several sources (Guha et al, 2011;Song et al, 2001) estimated character strings entered by user's keystrokes. Here keystrokes were a part of typing in an SSH connection except its handshake; hence the algorithms were not applicable for detecting SSH dictionary attacks.…”
Section: Related Workmentioning
confidence: 99%
“…D&R procedures and the D&R computational environment will be illustrated here by our analyses of large complex packet‐level Internet traffic data for research in network performance and cyber security (Xi et al ; Guha et al ; Anderson et al ). Each Internet communication is a connection between two hosts (computers).…”
Section: Dandr Illustrated: Internet Packet‐level Trafficmentioning
confidence: 99%
“…We have developed D&R in conjunction with our own analyses of large complex data, especially Internet traffic datasets (Hafen et al ; Xi et al ; Guha et al ; Anderson et al ). We have succeeded in the above two goals.…”
Section: Introductionmentioning
confidence: 99%
“…We have employed the principles behind Trelliscope in many projects [12,22]. Here, we discuss three recent projects that have made direct use of the Trelliscope implementation.…”
Section: Applicationsmentioning
confidence: 99%