首页> 外文期刊>IEICE transactions on information and systems >A New Approach to Identify User Authentication Methods toward SSH Dictionary Attack Detection
【24h】

A New Approach to Identify User Authentication Methods toward SSH Dictionary Attack Detection

机译:一种识别SSH字典攻击检测用户身份验证方法的新方法

获取原文
           

摘要

A dictionary attack against SSH is a common security threat. Many methods rely on network traffic to detect SSH dictionary attacks because the connections of remote login, file transfer, and TCP/IP forwarding are visibly distinct from those of attacks. However, these methods incorrectly judge the connections of automated operation tasks as those of attacks due to their mutual similarities. In this paper, we propose a new approach to identify user authentication methods on SSH connections and to remove connections that employ non-keystroke based authentication. This approach is based on two perspectives: (1) an SSH dictionary attack targets a host that provides keystroke based authentication; and (2) automated tasks through SSH need to support non-keystroke based authentication. Keystroke based authentication relies on a character string that is input by a human; in contrast, non-keystroke based authentication relies on information other than a character string. We evaluated the effectiveness of our approach through experiments on real network traffic at the edges in four campus networks, and the experimental results showed that our approach provides high identification accuracy with only a few errors.
机译:针对SSH的字典攻击是一种常见的安全威胁。许多方法依靠网络流量来检测SSH字典攻击,因为远程登录,文件传输和TCP / IP转发的连接与攻击的连接明显不同。但是,这些方法由于彼此相似,因此错误地将自动化操作任务的连接判断为攻击的连接。在本文中,我们提出了一种新方法来识别SSH连接上的用户身份验证方法,并删除采用基于非击键身份验证的连接。这种方法基于两个角度:(1)SSH字典攻击针对的是提供基于击键身份验证的主机; (2)通过SSH的自动化任务需要支持基于非击键的身份验证。基于击键的认证依赖于人类输入的字符串。相反,基于非击键的身份验证依赖于字符串以外的信息。通过对四个园区网络边缘的实际网络流量进行实验,我们评估了该方法的有效性,实验结果表明,该方法具有很高的识别准确率,并且只有很少的错误。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号