首页> 外文会议>International conference on ICT systems security and privacy protection >Refined Detection of SSH Brute-Force Attackers Using Machine Learning
【24h】

Refined Detection of SSH Brute-Force Attackers Using Machine Learning

机译:通过机器学习精致检测SSH蛮力攻击者

获取原文

摘要

This paper presents a novel approach to detect SSH brute-force (BF) attacks in high-speed networks. Contrary to host-based approaches, we focus on network traffic analysis to identify attackers. Recent papers describe how to detect BF attacks using pure Net-Flow data. However, our evaluation shows significant false-positive (FP) results of the current solution. To overcome the issue of high FP rate, we propose a machine learning (ML) approach to detection using specially extended IP Flows. The contributions of this paper are a new dataset from real environment, experimentally selected ML method, which performs with high accuracy and low FP rate, and an architecture of the detection system. The dataset for training was created using extensive evaluation of captured real traffic, manually prepared legitimate SSH traffic with characteristics similar to BF attacks, and, finally, using a packet trace with SSH logs from real production servers.
机译:本文介绍了一种在高速网络中检测SSH暴力(BF)攻击的新方法。与基于宿主的方法相反,我们专注于网络流量分析来识别攻击者。最近的论文描述了如何使用纯净净流数据检测BF攻击。但是,我们的评价显示了当前解决方案的显着假阳性(FP)结果。为了克服高FP率的问题,我们提出了一种通过特殊扩展IP流检测机器学习(ML)方法。本文的贡献是来自真实环境的新数据集,实验选择的ML方法,其具有高精度和低FP速率,以及检测系统的架构。使用与BF攻击类似的特征,使用与BF攻击类似的特征,使用与BF攻击类似的特征的合法SSH流量来创建数据集。最后,使用具有来自真实生产服务器的SSH日志的数据包跟踪。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号