Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4567
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKhandait, Pratibhaen_US
dc.contributor.authorTiwari, Namrataen_US
dc.contributor.authorHubballi, Neminathen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:34:51Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:34:51Z-
dc.date.issued2021-
dc.identifier.citationKhandait, P., Tiwari, N., & Hubballi, N. (2021). Who is trying to compromise your SSH server ? an analysis of authentication logs and detection of bruteforce attacks. Paper presented at the ACM International Conference Proceeding Series, 127-132. doi:10.1145/3427477.3429772en_US
dc.identifier.isbn9781450381840-
dc.identifier.otherEID(2-s2.0-85098892960)-
dc.identifier.urihttps://doi.org/10.1145/3427477.3429772-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4567-
dc.description.abstractSecure Socket Shell (SSH) allows users to connect and access the system remotely through a publicly exposed interface. These systems often become the target of attacks where an intruder attempts to break into a system by guessing login credentials. These login attempts are generally recorded into a log file by the server. Our contribution in this paper is twofold. First we report on a case study using logs of an SSH server deployed in a production environment. Using a dataset collected over a span of one month with more than one hundred thousand connection records, we study various types of failed login attempts, common usernames being attempted, recurrence of attack sources over time and geographical location of attackers. Our case study reveals that attackers attempt various methods to break into the system, there are few common usernames which were tried persistently, origin of attacks are well spread and more than a handful number of sources make repeated attempts to break into the system spanning weeks. As a second contribution, we propose a method to differentiate failed and successful login attempts using network flow level statistics and subsequently use them to detect attacks. We experiment with flow records labelled with ground truth and show that proposed method is able to identify logins which are failed as well as successful. © 2021 ACM.en_US
dc.language.isoenen_US
dc.publisherAssociation for Computing Machineryen_US
dc.sourceACM International Conference Proceeding Seriesen_US
dc.subjectBrute-force attacken_US
dc.subjectGeographical locationsen_US
dc.subjectGround truthen_US
dc.subjectNetwork flowsen_US
dc.subjectNumber of sourcesen_US
dc.subjectProduction environmentsen_US
dc.subjectSecure socketsen_US
dc.subjectWell-spreaden_US
dc.subjectInternet protocolsen_US
dc.titleWho is Trying to Compromise Your SSH Server ? An Analysis of Authentication Logs and Detection of Bruteforce Attacksen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: