2016 International Conference on Information &Amp; Communication Technology and Systems (ICTS) 2016
DOI: 10.1109/icts.2016.7910269
|View full text |Cite
|
Sign up to set email alerts
|

Clustering of SSH brute-force attack logs using k-clique percolation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…The paper now provides size-constrained clique applications and show how they can be solved using maximum k-clique and the maximum weight k-clique techniques. These applications include social network analysis [217], community detection [218]- [221], network monitoring [222], and bioinformatics and biomedicine [223].…”
Section: Applications Of the K-clique Problem Inmentioning
confidence: 99%
“…The paper now provides size-constrained clique applications and show how they can be solved using maximum k-clique and the maximum weight k-clique techniques. These applications include social network analysis [217], community detection [218]- [221], network monitoring [222], and bioinformatics and biomedicine [223].…”
Section: Applications Of the K-clique Problem Inmentioning
confidence: 99%
“…This issue could create a big threat especially if the device was used for a critical function such as medical applications [28]. The second most common attack through all the versions was Bypassing one of the mechanisms that are used to start and initiate the SSH connection which could result in reducing the security as each one of the mechanisms and steps that are adopted by OpenSSH are meant to maintain the security as this is the main purpose of using SSH over the clear text telnet services [29]. Gaining the privileges was the third most common vulnerability on the OpenSSH through its all versions.…”
Section: Security Evaluation Of Raspbian and Ssh Various Versions Imp...mentioning
confidence: 99%
“…Gaining privileges is an extremely dangerous issue as having a non-root user gain-ing higher privileges will allow him to experiment a huge amount of open possibilities to manipulate the system and obtain full access and control over the system [30]. As it is always recommended to perform the updates for all the packages and tools including OpenSSH it is worth mentioning that the released versions of the OpenSSH in 2017 were having in total around six various vulnerabilities that are distributed over various categories [29]. At the same time, the 2015 OpenSSH releases recorded no published vulnerabilities at all.…”
Section: Security Evaluation Of Raspbian and Ssh Various Versions Imp...mentioning
confidence: 99%