Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516719
|View full text |Cite
|
Sign up to set email alerts
|

Detecting stealthy, distributed SSH brute-forcing

Abstract: In this work we propose a general approach for detecting distributed malicious activity in which individual attack sources each operate in a stealthy, low-profile manner. We base our approach on observing statistically significant changes in a parameter that summarizes aggregate activity, bracketing a distributed attack in time, and then determining which sources present during that interval appear to have coordinated their activity. We apply this approach to the problem of detecting stealthy distributed SSH b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
27
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 53 publications
(27 citation statements)
references
References 10 publications
0
27
0
Order By: Relevance
“…Subsequently, he elaborated the concept of bad neighbourhoods on spam in [1], [2], [8]. A thorough study [4] focusing exclusively on SSH bruteforce attacks shows that some attacks are distributed as well as stealthy.…”
Section: Related Workmentioning
confidence: 99%
“…Subsequently, he elaborated the concept of bad neighbourhoods on spam in [1], [2], [8]. A thorough study [4] focusing exclusively on SSH bruteforce attacks shows that some attacks are distributed as well as stealthy.…”
Section: Related Workmentioning
confidence: 99%
“…Attackers may then either actively misuse targets or leave them aside for the time being. Note that not all attack phases need to be visible within a certain portion of network traffic, since attackers may choose to delay execution of attack phases or execute attack phases from different machines to evade detection [13]. The scan phase in the context of attacks against Web applications is different in nature from attacks against other applications.…”
Section: Start Endmentioning
confidence: 99%
“…Legitimate login failures on SSH server portrays a Beta-Binomial Distribution [8]. When there is a distributed brute-force attack, the Global Factor Indicator (GFI) would deviate from the mean of the normal user traffic distribution.…”
Section: Related Workmentioning
confidence: 99%