2010 Third International Conference on Intelligent Networks and Intelligent Systems 2010
DOI: 10.1109/icinis.2010.9
|View full text |Cite
|
Sign up to set email alerts
|

SSH Dictionary Attack and DNS Reverse Resolution Traffic in Campus Network

Abstract: We performed statistical analysis on the total PTR resource record (RR) based DNS query packet traffic from a university campus network to the top domain DNS server through March 14th, 2009, when the network servers in the campus network were under inbound SSH dictionary attack. The interesting results are obtained, as follows: (1) the network servers, especially, they have a function of SSH services, generated the significant PTR RR based DNS query request packet traffic through 07:30-08:30 in March 14th, 200… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 4 publications
0
7
0
1
Order By: Relevance
“…Kumagai et al [11] calculated the sample variance of the total PTR resource record based DNS query packet traffic of campus networks servers which were under brute force attack. Their observations show there is a change in this statistical value when the SSH brute force attack occurs.…”
Section: Related Workmentioning
confidence: 99%
“…Kumagai et al [11] calculated the sample variance of the total PTR resource record based DNS query packet traffic of campus networks servers which were under brute force attack. Their observations show there is a change in this statistical value when the SSH brute force attack occurs.…”
Section: Related Workmentioning
confidence: 99%
“…O registro reverso (PTR) é útil para identificar enderec ¸os IPs válidos, pois cada IP acessível na Internet deve possuir um nome reverso [Barr 1996]. Em ataques de reconhecimento de rede, o registro PTR é mais utilizado [Kumagai et al 2010]. Ataques de dicionário contra o servic ¸o SSH podem ser identificados através da distribuic ¸ão de frequência do registro reverso [Shibata et al 2012].…”
Section: Antonakakis Et Al (unclassified
“…Intrusion detection systems (IDS) are powerful security information and event management (SIEM) tools that help network operators protect vulnerable devices by monitoring malicious activities and automatically recording intrusion events within the network. Current IDS systems utilize three main methods to detect network attacks, namely (1) predefined rules or virus signatures [3][4][5][6]12], (2) anomaly detection [12][13][14][15][16], and (3) artificial intelligence [17][18][19][20][21][22][23][24][25][26] (machine-learning or deep-learning models). However, predefined detection methods require the identification and implementation of effective rules in advance and/or the extensive collection and update of potential virus signatures.…”
Section: Introductionmentioning
confidence: 99%