首页> 外文会议>International Conference on Information, Communication Technology and System >Clustering of SSH brute-force attack logs using k-clique percolation
【24h】

Clustering of SSH brute-force attack logs using k-clique percolation

机译:使用k-clique灭菌的SSH Brute-Force攻击日志的聚类

获取原文

摘要

The brute-force attacks to SSH service still persist in the server environments. The existing methods have not applied graph theory to analyze authentication log that records this attack. Therefore, we model the log as a graph and propose k-clique percolation to cluster auth.log file to assist the system administrators to inspect this incident. The k-clique percolation has proven in clustering of biological networks and we will deploy it to this problem. We then provide the mechanism for edge removal to separate the generated clusters and make clear the clustering outputs. The experimental results show that this approach is appropriate to cluster raw logs of SSH brute-force attacks.
机译:对SSH服务的强力攻击仍然存在于服务器环境中。现有方法没有应用图形理论来分析记录此攻击的身份验证日志。因此,我们将日志作为图形模拟并提出k-clique percolation到cluster auth.log文件,以帮助系统管理员检查此事件。 K-Clique渗滤已经证明了生物网络的聚类,我们将把它部署到这个问题。然后,我们提供了边缘删除的机制,以分离生成的集群并清除聚类输出。实验结果表明,这种方法适合于群体的SSH暴力攻击的原始日志。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号