Detecting SSH and FTP Brute Force Attacks in Big Data

被引:3
|
作者
Hancock, John [1 ]
Khoshgoftaar, Taghi M. [1 ]
Leevy, Joffrey L. [1 ]
机构
[1] Florida Atlantic Univ, Boca Raton, FL 33431 USA
关键词
Decision Tree; Cyber-security; CSE-CIC-IDS2018; Big Data; Intrusion Detection; Brute-Force Attack;
D O I
10.1109/ICMLA52953.2021.00126
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a simple approach for detecting brute force attacks in the CSE-CIC-IDS2018 Big Data dataset. We show our approach is preferable to more complex approaches since it is simpler, and yields stronger classification performance. Our contribution is to show that it is possible to train and test simple Decision Tree models with two independent variables to classify CSE-CIC-IDS2018 data with better results than reported in previous research, where more complex Deep Learning models are employed. Moreover, we show that Decision Tree models trained on data with two independent variables perform similarly to Decision Tree models trained on a larger number independent variables. Our experiments reveal that simple models, with AUC and AUPRC scores greater than 0.99, are capable of detecting brute force attacks in CSE-CIC-IDS2018. To the best of our knowledge, these are the strongest performance metrics published for the machine learning task of detecting these types of attacks. Furthermore, the simplicity of our approach, combined with its strong performance, makes it an appealing technique.
引用
收藏
页码:760 / 765
页数:6
相关论文
共 50 条
  • [41] Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment
    Jae-Kook Lee
    Sung-Jun Kim
    Chan Yeol Park
    Taeyoung Hong
    Huiseung Chae
    Journal of the Korean Physical Society, 2016, 69 : 253 - 258
  • [42] Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic
    Wichmann, Pascal
    Marx, Matthias
    Federrath, Hannes
    Fischer, Mathias
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [43] Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks
    Puthuparambil, Arun Babu
    Thomas, Jithin Jose
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [44] Detection of HTTPS Brute-Force Attacks with Packet-Level Feature Set
    Luxemburk, Jan
    Hynek, Karel
    Cejka, Tomas
    2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 114 - 122
  • [45] Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment
    Lee, Jae-Kook
    Kim, Sung-Jun
    Park, Chan Yeol
    Hong, Taeyoung
    Chae, Huiseung
    JOURNAL OF THE KOREAN PHYSICAL SOCIETY, 2016, 69 (02) : 253 - 258
  • [46] TOPASE: Detection of Brute Force Attacks used Disciplined IPs from IDS Log
    Honda, Satomi
    Unno, Yuki
    Maruhashi, Koji
    Takenaka, Masahiko
    Torii, Satoru
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1361 - 1364
  • [47] Resistance Against Brute-Force Attacks on Stateless Forwarding in Information Centric Networking
    Alzahrani, Bander A.
    Reed, Martin J.
    Vassilakis, Vassilios G.
    ELEVENTH 2015 ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS, 2015, : 193 - 194
  • [48] An Efficient Cryptographic Scheme for Text Message Protection against Brute Force and Cryptanalytic Attacks
    Joshi, Abhishek
    Wazid, Mohammad
    Goudar, R. H.
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 360 - 366
  • [49] What's in a Name? Using Words' Uniqueness to Identify Hackers in Brute Force Attacks
    Rechavi, Amit
    Berenblum, Tamar
    INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2020, 14 (01): : 361 - 382
  • [50] Brute Force Vulnerability Testing Technology based on Data Mutation
    Gu, Shijia
    Li, Weihai
    Zhao, Xin
    2011 IEEE VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2011,