Wu et al., 2020 - Google Patents
Poster: Mining threat intelligence from billion-scale ssh brute-force attacksWu et al., 2020
View PDF- Document ID
- 16034298545574851302
- Author
- Wu Y
- Cao P
- Withers A
- Kalbarczyk Z
- Iyer R
- Publication year
- Publication venue
- Proc. Netw. Distrib. Syst. Security
External Links
Snippet
This paper presents a longitudinal study of 11 Billion SSH brute-force attacks targeting an operational system at the National Center for Supercomputing Applications. We report the nature of these attacks in terms of i) targeted strategies (ie, using stolen SSH keys), ii) large …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bahrami et al. | Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures. | |
Lanelli et al. | Botnets as a vehicle for online crime | |
US9160764B2 (en) | Systems and methods for dynamic protection from electronic attacks | |
Joshi et al. | Honeypots: a new paradigm to information security | |
Soltani et al. | A survey on real world botnets and detection mechanisms | |
Kumar et al. | Network security–an updated perspective | |
Altwairqi et al. | Four most famous cyber attacks for financial gains | |
Thom et al. | Correlation of cyber threat intelligence data across global honeypots | |
Newman | Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities | |
Islam | Security auditing tools: a comparative study | |
Czosseck et al. | On the arms race around botnets-setting up and taking down botnets | |
Mielke et al. | Botnets, and the cybercriminal underground | |
Fernandes et al. | A quick perspective on the current state in cybersecurity | |
Wu | Mining threat intelligence from billion-scale SSH brute-force attacks | |
Govil | Examining the criminology of bot zoo | |
Wu et al. | Poster: Mining threat intelligence from billion-scale ssh brute-force attacks | |
Pahal et al. | Distributed Denial of Services attacks on cloud servers: Detection, Analysis, and Mitigation | |
Marchetti et al. | Cyber attacks on financial critical infrastructures | |
Siwakoti et al. | Your ip camera can be abused for payments: A study of iot exploitation for financial services leveraging shodan and criminal infrastructures | |
Pahal et al. | A Comprehensive Research Study on Low-Interaction Secure Shell Honeypot. | |
Musambo et al. | Identifying Botnets Intrusion & Prevention –A Review | |
Acarali et al. | Botnet-based attacks and defence mechanisms | |
Hamisi et al. | Intrussion detection by penetration test in an organization network | |
Agbogun et al. | Network security management: solutions to network intrusion related problems | |
Badrulddin | A study and analysis of attacks by exploiting the source code against computer systems |