2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC) 2021
DOI: 10.1109/ccwc51732.2021.9375998
|View full text |Cite
|
Sign up to set email alerts
|

Detection of HTTPS Brute-Force Attacks with Packet-Level Feature Set

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 13 publications
0
7
0
1
Order By: Relevance
“…The behavior-based features are focused on describing the specific set of behaviors of the SFTS. The set of behavior- [47] 99.19 99.20 -CIC-Bell-DNS [22] Mahdavifar et al [22] 98.9 98.9 -Zebin et al [21] 99.98 99.91 -CIC-DoHBrw-2020 [8] MontazeriShatoori [8] -99.30 -DoH-Real-world [18] Jeřábek et al [9] 97.5 98.7 -HTTPS Brute-force [48] Luxemburk et al [10] 99.93 96.26 -Shafiq et al [49] 99.99 99.99 -Bot-IoT [50] Shafiq et al [51] 99.99 99.99 -Khacha et al [52] 99…”
Section: E Behavior-based Featuresmentioning
confidence: 99%
See 1 more Smart Citation
“…The behavior-based features are focused on describing the specific set of behaviors of the SFTS. The set of behavior- [47] 99.19 99.20 -CIC-Bell-DNS [22] Mahdavifar et al [22] 98.9 98.9 -Zebin et al [21] 99.98 99.91 -CIC-DoHBrw-2020 [8] MontazeriShatoori [8] -99.30 -DoH-Real-world [18] Jeřábek et al [9] 97.5 98.7 -HTTPS Brute-force [48] Luxemburk et al [10] 99.93 96.26 -Shafiq et al [49] 99.99 99.99 -Bot-IoT [50] Shafiq et al [51] 99.99 99.99 -Khacha et al [52] 99…”
Section: E Behavior-based Featuresmentioning
confidence: 99%
“…Since flows contain mainly information from packet headers and do not extract the payload, they are not affected by the payload encryption and are the ideal candidate for encrypted traffic monitoring. Many research works [3]- [5], [5]- [10] thus use it together with machine learning for encrypted traffic classification to increase visibility and identify encrypted malicious communication.…”
Section: Introductionmentioning
confidence: 99%
“…As with many protocols, HTTP and HTTPS protocols also have vulnerabilities. Attackers exploit these vulnerabilities and perform attacks such as Man in the VOLUME X, 2021 Middle (MITM), brute force, Distributed Denial of Service (DDoS), SQL Injection (SQLI), and Cross Site Scripting (XSS) attacks [3].…”
Section: Introductionmentioning
confidence: 99%
“…It has been reported that despite the inherent security measures implemented in HTTPS, information such as web page fingerprints, packet sizes, and timing information are leaked by HTTPS. Attackers, on the other hand, perform brute force attacks to predict the passwords of users with special lists prepared using such information [3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation