This thesis first presents Continuous Auditing of Secure Shell (SSH) Servers to Mitigate Brute-Force Attacks (CAUDIT), an operational system deployed at the National Center for Supercomputing Applications (NCSA) at the University of Illinois. One of CAUDIT’s key features includes a honeypot, which attracted and recorded 11 billion SSH brute-force attack attempts targeting the operational system at NCSA from February 2017 to November 2019. Based on the attack data, this thesis then presents a comprehensive study to characterize the attack nature of the 11 billion attack attempts. We report the nature of these attacks in terms of i) persistence (i.e., consecutively attacking over an entire year), ii) targeted strategies (i.e., using stolen SS...
In SSH brute forcing attacks, adversaries try a lot of different username and password combinations ...
Botnets are exponentially increasing because of new zero-day attacks, a variation of their behavior,...
Botnets are exponentially increasing because of new zero-day attacks, a variation of their behavior,...
Abstract. We report on what we believe to be the largest dataset (to date) of automated secure shell...
We report on what we believe to be the largest dataset (to date) of automated secure shell (SSH) bru...
Botnets are causing severe damages to users, companies, and governments through information theft, a...
Dictionary attacks against SSH daemons are a common type of brute-force attack, in which attackers p...
Due to growth of Cloud computing usage, the need to apply encrypted protocols to provide confidentia...
In SSH brute forcing attacks, adversaries try a lot of different username and password combinations ...
Abstract: We explain botnets and the motivation of attackers utilizing botnets with a focus on SSH b...
Due to growth of Cloud computing usage, the need to apply encrypted protocols to provide confidentia...
Abstract The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely...
Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accou...
Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accou...
The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessin...
In SSH brute forcing attacks, adversaries try a lot of different username and password combinations ...
Botnets are exponentially increasing because of new zero-day attacks, a variation of their behavior,...
Botnets are exponentially increasing because of new zero-day attacks, a variation of their behavior,...
Abstract. We report on what we believe to be the largest dataset (to date) of automated secure shell...
We report on what we believe to be the largest dataset (to date) of automated secure shell (SSH) bru...
Botnets are causing severe damages to users, companies, and governments through information theft, a...
Dictionary attacks against SSH daemons are a common type of brute-force attack, in which attackers p...
Due to growth of Cloud computing usage, the need to apply encrypted protocols to provide confidentia...
In SSH brute forcing attacks, adversaries try a lot of different username and password combinations ...
Abstract: We explain botnets and the motivation of attackers utilizing botnets with a focus on SSH b...
Due to growth of Cloud computing usage, the need to apply encrypted protocols to provide confidentia...
Abstract The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely...
Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accou...
Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accou...
The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessin...
In SSH brute forcing attacks, adversaries try a lot of different username and password combinations ...
Botnets are exponentially increasing because of new zero-day attacks, a variation of their behavior,...
Botnets are exponentially increasing because of new zero-day attacks, a variation of their behavior,...