2014 IEEE International Conference on Bioinformatics and Bioengineering 2014
DOI: 10.1109/bibe.2014.73
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning for Detecting Brute Force Attacks at the Network Level

Abstract: The tremendous growth in computer network and Internet usage, combined with the growing number of attacks makes network security a topic of serious concern. One of the most prevalent network attacks that can threaten computers connected to the network is brute force attack. In this work we investigate the use of machine learners for detecting brute force attacks (on the SSH protocol) at the network level. We base our approach on applying machine learning algorithms on a newly generated dataset based upon netwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(27 citation statements)
references
References 6 publications
(7 reference statements)
0
16
0
Order By: Relevance
“…In addition to that, additional attacks were run manually. The IDS SNORT 16 and manual inspection were used for labeling. Since the data set is not publicly available due to privacy concerns, we are not able to fill all properties in Table III. ISCX 2012 [28].…”
Section: Data Setmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to that, additional attacks were run manually. The IDS SNORT 16 and manual inspection were used for labeling. Since the data set is not publicly available due to privacy concerns, we are not able to fill all properties in Table III. ISCX 2012 [28].…”
Section: Data Setmentioning
confidence: 99%
“…IT security is an important issue and much effort has been spent in the research of intrusion and insider threat detection. Many contributions have been published for processing security-related data [1]- [4], detecting botnets [5]- [8], port scans [9]- [12], brute force attacks [13]- [16] and so on. All these works have in common that they require representative network-based data sets.…”
Section: Introductionmentioning
confidence: 99%
“…• Brute Force [26], [27]: A brute force attack is one of the most common attack types that threaten computer networks and break encryption. In this kind of attack, the attacker attempts to get user credentials by utilizing a repetitive method to guess username and password using automated software to get the valid account information of victims.…”
Section: B Types Of Network Attacksmentioning
confidence: 99%
“…Najafabadi et al investigated several kinds of machine learnings for detecting brute force attacks with real data sets in Ref. [6]. Furthermore, not limited to brute force attacks, intrusion detection with anomaly detection and machine learning has been described in Refs.…”
Section: Detecting Brute Force Attacksmentioning
confidence: 99%