首页> 外文会议>International conference on security management >A Denied-Events based Detection Method against SSH Brute-force Attack in Supercomputing Service Environment
【24h】

A Denied-Events based Detection Method against SSH Brute-force Attack in Supercomputing Service Environment

机译:超级计算服务环境中基于拒绝事件的SSH暴力攻击检测方法

获取原文

摘要

The brute-force attack is one of general cyber security threats in supercomputing service environment using a secure shell (SSH) protocol. First we analyzed SSH brute-force attacks had been detected through the log file parsing method of servers in the KISTI. We found that SSH brute-force attacks are classified '1:1', '1:N' or 'N:1' types of attack between source and destination IP address. And the duration of attacks that is generally the time it takes to execute attacks keeps enough long time. In this paper, we propose a SSH brute-force attack detection method using denied-events of firewalls and evaluate the effectiveness of the method. The analysis results show that our method filter beforehand by 46% on average that the attack traffic flow to active servers.
机译:蛮力攻击是使用安全外壳(SSH)协议的超级计算服务环境中的一般网络安全威胁之一。首先,我们分析了通过KISTI中服务器的日志文件解析方法检测到的SSH暴力攻击。我们发现SSH暴力攻击在源IP地址和目标IP地址之间被分为“ 1:1”,“ 1:N”或“ N:1”攻击类型。攻击的持续时间(通常是执行攻击所需的时间)可以保持足够长的时间。在本文中,我们提出了一种使用防火墙拒绝事件的SSH暴力攻击检测方法,并评估了该方法的有效性。分析结果表明,我们的方法平均将攻击流量流向活动服务器的平均过滤率为46%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号