2016
DOI: 10.17485/ijst/2016/v9i24/96070
|View full text |Cite
|
Sign up to set email alerts
|

Brute-force Attacks Analysis against SSH in HPC Multi-user Service Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…In Linux systems, interposition is "the process of placing a new or different library function between the application and its reference to a library function" [18]. Example interposition library attacks include attacking the libc Probe-based login attack [19,20] It is similar with brute-force login attack, when the username of the HPC facilities are known to the attacker, they can create a dictionary of all potential passwords to launch the password guessing campaign as HPC facilities usually are "open" to users all around the network.…”
Section: Commonly Known Attacksmentioning
confidence: 99%
“…In Linux systems, interposition is "the process of placing a new or different library function between the application and its reference to a library function" [18]. Example interposition library attacks include attacking the libc Probe-based login attack [19,20] It is similar with brute-force login attack, when the username of the HPC facilities are known to the attacker, they can create a dictionary of all potential passwords to launch the password guessing campaign as HPC facilities usually are "open" to users all around the network.…”
Section: Commonly Known Attacksmentioning
confidence: 99%