2013
DOI: 10.1007/978-3-642-40552-5_30
|View full text |Cite
|
Sign up to set email alerts
|

Protocol-Independent Detection of Dictionary Attacks

Abstract: Abstract. Data throughput of current high-speed networks makes it prohibitively expensive to detect attacks using conventional means of deep packet inspection. The network behavior analysis seemed to be a solution, but it lacks in several aspects. The academic research focuses on sophisticated and advanced detection schemes that are, however, often problematic to deploy into the production. In this paper we try different approach and take inspiration from industry practice of using relatively simple but effect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…They have also found flow counts typical for such attacks. Also Drašar [4] has revealed that for automated dictionary attacks low variance in flow count is symptomatical. Based on their observations we have decided to implement four sketch-based methods covering four different aspects of dictionary attacks.…”
Section: Methods Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…They have also found flow counts typical for such attacks. Also Drašar [4] has revealed that for automated dictionary attacks low variance in flow count is symptomatical. Based on their observations we have decided to implement four sketch-based methods covering four different aspects of dictionary attacks.…”
Section: Methods Evaluationmentioning
confidence: 99%
“…The same approach was used for the destination network scan detection, whose result can be seen in Figure 1b, and for abnormal number of connections, whose results can be seen in Figure 2a. Anomaly scores for low traffic variance detection were based on a paper by Drašar [4] and set as an inverse of relative difference in flow count.…”
Section: Particular Detection Methodsmentioning
confidence: 99%
“…We often refer to this kind of traffic as flat traffic, since it features traffic flows in the brute-force phase that are alike in terms of the number of packets and bytes, and duration. Most works in the context of flow-based intrusion detection rely on the identification of this flat traffic to find brute-force attacks [8,9,[25][26][27]. The compromise phase is then typically identified by deviations from the brute-force phase traffic pattern [27].…”
Section: Start Endmentioning
confidence: 99%
“…This causes attacks from countries that are far-away from the observation point-above all in terms of geographical distance-to stay under the radar of Intrusion Detection Systems (IDSs). But even if flat traffic is identified properly, its ''detection for HTTP(S) was found to be ineffective, because valid AJAX updates common on Web 2.0 tend to produce flat traffic pattern'' [8]. This is also confirmed by [24], where it is shown impossible to differentiate traffic of Web crawlers and calendar fetchers from dictionary attack traffic based on packet and byte counters alone.…”
Section: Traffic Characteristicsmentioning
confidence: 99%
See 1 more Smart Citation