Analysis and Response of SSH Brute Force Attacks in Multi-User Computing Environment


KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 6, pp. 205-212, Jun. 2015
10.3745/KTCCS.2015.4.6.205, Full Text:

Abstract

SSH provides a secure, encrypted communication channel between two end point systems using public key encryption. But SSH brute force attack is one of the most significant attacks. This kind of attack aims to login to the SSH server by continually guessing a large number of user account and password combinations. In this paper, we analyze logs of SSH brute force attacks in 2014 and propose a failed-log based detection mechanism in high performance computing service environment.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. K. Lee, S. J. Kim, J. Woo and C. Y. Park, "Analysis and Response of SSH Brute Force Attacks in Multi-User Computing Environment," KIPS Transactions on Computer and Communication Systems, vol. 4, no. 6, pp. 205-212, 2015. DOI: 10.3745/KTCCS.2015.4.6.205.

[ACM Style]
Jae Kook Lee, Sung Jun Kim, Joon Woo, and Chan Yeol Park. 2015. Analysis and Response of SSH Brute Force Attacks in Multi-User Computing Environment. KIPS Transactions on Computer and Communication Systems, 4, 6, (2015), 205-212. DOI: 10.3745/KTCCS.2015.4.6.205.