2016 6th International Conference on IT Convergence and Security (ICITCS) 2016
DOI: 10.1109/icitcs.2016.7740316
|View full text |Cite
|
Sign up to set email alerts
|

Classification of SSH Attacks Using Machine Learning Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…This paper is an extension of the conference paper [17] done by the same authors. The conference paper describes the machine learning model and the feature selection.…”
Section: Related Workmentioning
confidence: 94%
“…This paper is an extension of the conference paper [17] done by the same authors. The conference paper describes the machine learning model and the feature selection.…”
Section: Related Workmentioning
confidence: 94%
“…Gaining the privileges was the third most common vulnerability on the OpenSSH through its all versions. Gaining privileges is an extremely dangerous issue as having a non-root user gain-ing higher privileges will allow him to experiment a huge amount of open possibilities to manipulate the system and obtain full access and control over the system [30]. As it is always recommended to perform the updates for all the packages and tools including OpenSSH it is worth mentioning that the released versions of the OpenSSH in 2017 were having in total around six various vulnerabilities that are distributed over various categories [29].…”
Section: Security Evaluation Of Raspbian and Ssh Various Versions Imp...mentioning
confidence: 99%
“…This issue could be explained by the fact that the higher the version, the more options, and services are available in the implementation exposing the system to further exploitation vulnerabilities [27]. Another explanation could be that the latest versions of the OpenSSH are designed to provide backward compatibility including, for example, the support for the SSH V1 that is considered to be weak and crackable communication by the widely available tools [30].…”
Section: Security Evaluation Of Raspbian and Ssh Various Versions Imp...mentioning
confidence: 99%
“…Sadasivam et al [123] distributed cyber threats into two categories. The first category is "Severe" attacks in which commands have been executed after successful login.…”
Section: Density-based Spatial Clustering Of Applications With Noisementioning
confidence: 99%
“…Cyber attacks have been previously categorised based on whether or not commands were executed by the attackers in the attack process [72,123]. The command data have subsequently been manually analysed to categorise attacks and attackers' actions [31,20].…”
Section: Introductionmentioning
confidence: 99%