IEEE SoutheastCon 2008 2008
DOI: 10.1109/secon.2008.4494264
|View full text |Cite
|
Sign up to set email alerts
|

A distributed active response architecture for preventing SSH dictionary attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
1

Year Published

2008
2008
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(17 citation statements)
references
References 2 publications
0
16
1
Order By: Relevance
“…For example, it is well known that automated password attacks on SSH servers are currently on-going [21,25,26]. For reasons possibly related to marketing and public relations, the extent and success of similar password attacks on businesses, banks, and so on, are harder to find public information about, being less commonly reported if at all.…”
Section: Background and Related Workmentioning
confidence: 99%
“…For example, it is well known that automated password attacks on SSH servers are currently on-going [21,25,26]. For reasons possibly related to marketing and public relations, the extent and success of similar password attacks on businesses, banks, and so on, are harder to find public information about, being less commonly reported if at all.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Further connections from a client were denied by dynamically adding a rule, if the number of unsuccessful login attempts exceeded a pre-defined threshold. Thames et al [26] outlined a new architecture for preventing SSH dictionary attacks. In this architecture, trustworthy servers gathered, analyzed, and distributed information about malicious clients through collaboration.…”
Section: Related Work and Limitationsmentioning
confidence: 99%
“…It is complicated to detect such attacks, especially low-profile ones, because an isolated attack attempt differs from a legitimate one only by intention and not any measurable properties. That is why they are so prevalent [3], [7], [9]. However, they do not receive enough academic attention as most research is focused on DoS attacks, botnet activity and other disturbant behavior [8].…”
Section: Dictionary Attacksmentioning
confidence: 99%