Detecting SSH and FTP Brute Force Attacks in Big Data

被引:3
|
作者
Hancock, John [1 ]
Khoshgoftaar, Taghi M. [1 ]
Leevy, Joffrey L. [1 ]
机构
[1] Florida Atlantic Univ, Boca Raton, FL 33431 USA
关键词
Decision Tree; Cyber-security; CSE-CIC-IDS2018; Big Data; Intrusion Detection; Brute-Force Attack;
D O I
10.1109/ICMLA52953.2021.00126
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a simple approach for detecting brute force attacks in the CSE-CIC-IDS2018 Big Data dataset. We show our approach is preferable to more complex approaches since it is simpler, and yields stronger classification performance. Our contribution is to show that it is possible to train and test simple Decision Tree models with two independent variables to classify CSE-CIC-IDS2018 data with better results than reported in previous research, where more complex Deep Learning models are employed. Moreover, we show that Decision Tree models trained on data with two independent variables perform similarly to Decision Tree models trained on a larger number independent variables. Our experiments reveal that simple models, with AUC and AUPRC scores greater than 0.99, are capable of detecting brute force attacks in CSE-CIC-IDS2018. To the best of our knowledge, these are the strongest performance metrics published for the machine learning task of detecting these types of attacks. Furthermore, the simplicity of our approach, combined with its strong performance, makes it an appealing technique.
引用
收藏
页码:760 / 765
页数:6
相关论文
共 50 条
  • [31] IoT Lotto: Utilizing IoT Devices in Brute-Force Attacks
    Alani, Mohammed M.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 140 - 144
  • [32] Mitigating Brute-force Attacks on Bloom-filter Based Forwarding
    Alzahrani, Bander A.
    Vassilakis, Vassilios G.
    Reed, Martin J.
    2013 CONFERENCE ON FUTURE INTERNET COMMUNICATIONS (CFIC), 2013,
  • [33] Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization
    Salamatian, Salman
    Huleihel, Wasim
    Beirami, Ahmad
    Cohen, Asaf
    Medard, Muriel
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (09) : 2288 - 2299
  • [34] Universal Randomized Guessing With Application to Asynchronous Decentralized Brute-Force Attacks
    Merhav, Neri
    Cohen, Asaf
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (01) : 114 - 129
  • [35] AN ALGORITHM FOR GENERATING DIGITAL WATERMARKS ROBUST AGAINST BRUTE-FORCE ATTACKS
    Mitekin, V. A.
    COMPUTER OPTICS, 2015, 39 (05) : 808 - 817
  • [36] A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks
    Byun, Hyeonsu
    Kim, Jueun
    Jeong, Yunseok
    Seok, Byoungjin
    Gong, Seonghyeon
    Lee, Changhoon
    ELECTRONICS, 2024, 13 (13)
  • [37] A Statistical Analysis of Large Passwords Lists, Used to Optimize Brute Force Attacks
    van Heerden, Renier Pelser
    Vorster, Johannes
    4TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 111 - 128
  • [38] Universal Randomized Guessing with Application to Asynchronous Decentralized Brute-Force Attacks
    Merhav, Neri
    Cohen, Asaf
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 485 - 489
  • [39] FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows
    Sacramento, Luis
    Medeiros, Iberia
    Bota, Joao
    Correial, Miguel
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 567 - 572
  • [40] An Autonomous Data Structure for Brute Force Calculations in the Cloud
    Grampone, Silvia
    Litwin, Witold
    Schwarz, Thomas S. J.
    2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 347 - 354