iBusiness

Volume 3, Issue 1 (March 2011)

ISSN Print: 2150-4075   ISSN Online: 2150-4083

Google-based Impact Factor: 0.61  Citations  

Developing the Upgrade Detection and Defense System of SSH Dictionary-Attack for Multi-Platform Environment

HTML  Download Download as PDF (Size: 310KB)  PP. 65-70  
DOI: 10.4236/ib.2011.31011    5,412 Downloads   9,523 Views  Citations

Affiliation(s)

.

ABSTRACT

Based on the improved algorithm for analyzing log and the detection and defense system of SSH Dictionary-Attack for Multi-Platform Environment (Su, Chen, Chung & Wu), we developed the upgrade detection and defense system of SSH Dictionary-Attack for Multi-Platform Environment. In this study, we introduced the current threats and the types of SSH Dictionary-Attack. Then, we explained the functions and differences between the current defense software and defense types of SSH Dictionary-Attack; and described the current system of SSH Dictionary-Attack for Multi-Platform Environment. Moreover, based on the study of Su, Chen, Chung and Wu, we improved the algorithm of analyzing log in order to increase the defense capability of SSH Dictionary-Attack. After that, we designed the upgrade detection and defense system of SSH Dictionary-Attack for Multi-Platform Environment. The contribution of this study is to provide the upgrade detection and defense system of SSH Dictionary-Attack which was to keep the functions of original system of SSH Dictionary-Attack, and to improve the effectiveness of the algorithm of analyzing log.

Share and Cite:

Y. Su, G. Chung and B. Wu, "Developing the Upgrade Detection and Defense System of SSH Dictionary-Attack for Multi-Platform Environment," iBusiness, Vol. 3 No. 1, 2011, pp. 65-70. doi: 10.4236/ib.2011.31011.

Cited by

[1] Forensic investigation of event logs by automatic anomaly detection
2020
[2] OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms
2019
[3] Graph clustering and anomaly detection of access control log for forensic purposes
Digital Investigation, 2017
[4] 基于 O2O 模式的全民快递商业模式研究及推广
电脑知识与技术: 学术交流, 2016
[5] Brute-force Attacks Analysis against SSH in HPC Multi-user Service Environment
2016
[6] Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment
Journal of the Korean Physical Society, 2016
[7] A flow-based detection method for stealthy dictionary attacks against Secure Shell
?Journal of Information Security and Applications?, 2015
[8] Ein verbesserter PAM basierter Ansatz um" brute force" Passwort-Angriffe auf den" secure shell" Service zu erkennen und zu verhindern
Dissertation, 2014
[9] Ein verbesserter PAM-basierter Ansatz um “brute force”-Passwort-Angriffe auf den “secure shell”-Service zu erkennen und zu v
2013
[10] SSH dictionary attack detection based on flow analysis
?Applications and the Internet (SAINT), 2012 IEEE/IPSJ 12th International Symposium on. IEEE, 2012., 2012

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.