Detecting SSH and FTP Brute Force Attacks in Big Data

被引:3
|
作者
Hancock, John [1 ]
Khoshgoftaar, Taghi M. [1 ]
Leevy, Joffrey L. [1 ]
机构
[1] Florida Atlantic Univ, Boca Raton, FL 33431 USA
关键词
Decision Tree; Cyber-security; CSE-CIC-IDS2018; Big Data; Intrusion Detection; Brute-Force Attack;
D O I
10.1109/ICMLA52953.2021.00126
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a simple approach for detecting brute force attacks in the CSE-CIC-IDS2018 Big Data dataset. We show our approach is preferable to more complex approaches since it is simpler, and yields stronger classification performance. Our contribution is to show that it is possible to train and test simple Decision Tree models with two independent variables to classify CSE-CIC-IDS2018 data with better results than reported in previous research, where more complex Deep Learning models are employed. Moreover, we show that Decision Tree models trained on data with two independent variables perform similarly to Decision Tree models trained on a larger number independent variables. Our experiments reveal that simple models, with AUC and AUPRC scores greater than 0.99, are capable of detecting brute force attacks in CSE-CIC-IDS2018. To the best of our knowledge, these are the strongest performance metrics published for the machine learning task of detecting these types of attacks. Furthermore, the simplicity of our approach, combined with its strong performance, makes it an appealing technique.
引用
收藏
页码:760 / 765
页数:6
相关论文
共 50 条
  • [1] SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches
    Hossain, Md Delwar
    Ochiai, Hideya
    Doudou, Fall
    Kadobayashi, Youki
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2020), 2020, : 491 - 497
  • [2] Detection of SSH Brute Force Attacks Using Aggregated Netflow Data
    Najafabadi, Maryam M.
    Khoshgoftaar, Taghi M.
    Calvert, Chad
    Kemp, Clifford
    2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, : 283 - 288
  • [3] Realtime Risk Monitoring of SSH Brute Force Attacks
    Fahrnberger, Guenter
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2022, 2022, 1585 : 75 - 95
  • [4] Deep Learning-based Intrusion Detection: A Novel Approach for Identifying Brute-Force Attacks on FTP and SSH Protocol
    Alotibi, Noura
    Alshammari, Majid
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 107 - 111
  • [5] Hidden Markov Model Modeling of SSH Brute-Force Attacks
    Sperotto, Anna
    Sadre, Ramin
    de Boer, Pieter-Tjerk
    Pras, Aiko
    INTEGRATED MANAGEMENT OF SYSTEMS, SERVICES, PROCESSES AND PEOPLE IN IT, PROCEEDINGS, 2009, 5841 : 164 - 176
  • [6] Data Analytics for Modeling and Visualizing Attack Behaviors: A Case Study on SSH Brute Force Attacks
    Yao, Chengchao
    Luo, Xiao
    Zincir-Heywood, A. Nur
    2017 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2017, : 3573 - 3580
  • [7] Detecting Brute-Force Attacks on Cryptocurrency Wallets
    Kiktenko, E. O.
    Kudinov, M. A.
    Fedorov, A. K.
    BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2019, 2019, 373 : 232 - 242
  • [8] CAUDIT: Continuous Auditing of SSH Servers to Mitigate Brute-Force Attacks
    Cao, Phuong M.
    Wu, Yuming
    Banerjee, Subho S.
    Azoff, Justin
    Withers, Alexander
    Kalbarczyk, Zbigniew T.
    Iyer, Ravishankar K.
    PROCEEDINGS OF THE 16TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, 2019, : 667 - 682
  • [9] Machine Learning for Detecting Brute Force Attacks at the Network Level
    Najafabadi, Maryam M.
    Khoshgoftaar, Taghi M.
    Kemp, Clifford
    Seliya, Naeem
    Zuech, Richard
    2014 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOENGINEERING (BIBE), 2014, : 379 - 385
  • [10] Bloom Filter-Based Realtime Risk Monitoring of SSH Brute Force Attacks
    Fahrnberger, Guenter
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2023, 2023, 1876 : 48 - 67