메뉴 건너뛰기




Volumn , Issue , 2013, Pages 85-95

Detecting stealthy, distributed SSH brute-forcing

Author keywords

brute forcing; distributed; scanning; ssh

Indexed keywords

BETA-BINOMIAL DISTRIBUTIONS; BRUTE-FORCING; DISTRIBUTED; DISTRIBUTED ATTACK; INDIVIDUAL ATTACKS; LEGITIMATE USERS; MALICIOUS ACTIVITIES; SSH;

EID: 84889042469     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516719     Document Type: Conference Paper
Times cited : (56)

References (20)
  • 3
    • 84889007202 scopus 로고    scopus 로고
    • w.sshguard.net/.
  • 4
    • 84889013319 scopus 로고    scopus 로고
    • The Hail Mary Cloud Data - Data collected by Peter N. M. Hansteen (peter@bsdly.net)
    • The Hail Mary Cloud Data - Data collected by Peter N. M. Hansteen (peter@bsdly.net). http://www.bsdly.net/~peter/hailmary/.
  • 6
    • 84888997843 scopus 로고    scopus 로고
    • Technical report, University of Technology of Compiegne
    • R. Bezut and V. Bernet-Rollande. Study of Dictionary Attacks on SSH. Technical report, University of Technology of Compiegne, http://files.xdec.net/ TX-EN-Bezut-Bernet-Rollande-BruteForce-SSH.pdf,2010.
    • (2010) Study of Dictionary Attacks on SSH
    • Bezut, R.1    Bernet-Rollande, V.2
  • 7
    • 0001393743 scopus 로고
    • An approach to the probability distribution of CUSUM run length
    • D. Brook and D. A. Evans. An approach to the probability distribution of CUSUM run length. In Biometrika, volume 59, pages 539-549, 1972.
    • (1972) Biometrika , vol.59 , pp. 539-549
    • Brook, D.1    Evans, D.A.2
  • 11
    • 84889024397 scopus 로고    scopus 로고
    • Flow-based Detection of SSH Intrusion Attempts
    • University of Twente, January
    • L. Hellemons. Flow-based Detection of SSH Intrusion Attempts. In 16th Twente Student Conference on IT. University of Twente, January 2012.
    • (2012) 16th Twente Student Conference on IT
    • Hellemons, L.1
  • 12
    • 84888996198 scopus 로고    scopus 로고
    • C. Jacquier. Fail2Ban. http://www.fail2ban.org.
    • Jacquier, C.1
  • 16
    • 18144385431 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting SYN flooding attacks
    • IEEE
    • A. V. Siris and F. Papagalou. Application of anomaly detection algorithms for detecting SYN flooding attacks. In IEEE GLOBECOM, pages 2050-2054. IEEE, 2004.
    • (2004) IEEE GLOBECOM , pp. 2050-2054
    • Siris, A.V.1    Papagalou, F.2
  • 20
    • 84860570360 scopus 로고    scopus 로고
    • Detecting and Analyzing Automated Activity on Twitter
    • Springer
    • C. M. Zhang and V. Paxson. Detecting and Analyzing Automated Activity on Twitter. In Passive and Active Measurement. Springer, 2011.
    • (2011) Passive and Active Measurement
    • Zhang, C.M.1    Paxson, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.