[go: up one dir, main page]

Wu et al., 2020 - Google Patents

Poster: Mining threat intelligence from billion-scale ssh brute-force attacks

Wu et al., 2020

View PDF
Document ID
16034298545574851302
Author
Wu Y
Cao P
Withers A
Kalbarczyk Z
Iyer R
Publication year
Publication venue
Proc. Netw. Distrib. Syst. Security

External Links

Snippet

This paper presents a longitudinal study of 11 Billion SSH brute-force attacks targeting an operational system at the National Center for Supercomputing Applications. We report the nature of these attacks in terms of i) targeted strategies (ie, using stolen SSH keys), ii) large …
Continue reading at www.ndss-symposium.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Similar Documents

Publication Publication Date Title
Bahrami et al. Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures.
Lanelli et al. Botnets as a vehicle for online crime
US9160764B2 (en) Systems and methods for dynamic protection from electronic attacks
Joshi et al. Honeypots: a new paradigm to information security
Soltani et al. A survey on real world botnets and detection mechanisms
Kumar et al. Network security–an updated perspective
Altwairqi et al. Four most famous cyber attacks for financial gains
Thom et al. Correlation of cyber threat intelligence data across global honeypots
Newman Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities
Islam Security auditing tools: a comparative study
Czosseck et al. On the arms race around botnets-setting up and taking down botnets
Mielke et al. Botnets, and the cybercriminal underground
Fernandes et al. A quick perspective on the current state in cybersecurity
Wu Mining threat intelligence from billion-scale SSH brute-force attacks
Govil Examining the criminology of bot zoo
Wu et al. Poster: Mining threat intelligence from billion-scale ssh brute-force attacks
Pahal et al. Distributed Denial of Services attacks on cloud servers: Detection, Analysis, and Mitigation
Marchetti et al. Cyber attacks on financial critical infrastructures
Siwakoti et al. Your ip camera can be abused for payments: A study of iot exploitation for financial services leveraging shodan and criminal infrastructures
Pahal et al. A Comprehensive Research Study on Low-Interaction Secure Shell Honeypot.
Musambo et al. Identifying Botnets Intrusion & Prevention –A Review
Acarali et al. Botnet-based attacks and defence mechanisms
Hamisi et al. Intrussion detection by penetration test in an organization network
Agbogun et al. Network security management: solutions to network intrusion related problems
Badrulddin A study and analysis of attacks by exploiting the source code against computer systems