Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Detection of SSH Password Guessing Attacks using Classification Algorithms

View through CrossRef
The usage of SSH protocol has gained popularity among users due to its secure nature in recent times. Nevertheless, the SSH protocol can be susceptible to exploitation by hackers, who can access SSH servers without permission by exploiting vulnerabilities. SSH attacks cannot be completely detected using state-of-the-art security solutions like Firewall, Intrusion Detec- tion Systems, and so on. Malicious SSH traffic is created by malware and contains password guessing attacks. These attacks can result in compromising the security of servers and lead to the theft of private data. We aim to develop a robust and accurate SSH attack detection system that uses classification algorithms that can effectively differentiate between malicious SSH traffic and legitimate SSH traffic. In this paper, we have selected 14 classification algorithms like CNN, LSTM, Logistic regression, Deep Belief Networks, Auto Encoders, and so on. The process involves organising and preparing the data, extracting relevant features, and application of an ensemble learning approach with the selected classification algorithms. XGBoost is employed for model integration. The ensemble model achieves improved accuracy, successfully classifying between legitimate SSH traffic and SSH password guessing attacks.
Title: Detection of SSH Password Guessing Attacks using Classification Algorithms
Description:
The usage of SSH protocol has gained popularity among users due to its secure nature in recent times.
Nevertheless, the SSH protocol can be susceptible to exploitation by hackers, who can access SSH servers without permission by exploiting vulnerabilities.
SSH attacks cannot be completely detected using state-of-the-art security solutions like Firewall, Intrusion Detec- tion Systems, and so on.
Malicious SSH traffic is created by malware and contains password guessing attacks.
These attacks can result in compromising the security of servers and lead to the theft of private data.
We aim to develop a robust and accurate SSH attack detection system that uses classification algorithms that can effectively differentiate between malicious SSH traffic and legitimate SSH traffic.
In this paper, we have selected 14 classification algorithms like CNN, LSTM, Logistic regression, Deep Belief Networks, Auto Encoders, and so on.
The process involves organising and preparing the data, extracting relevant features, and application of an ensemble learning approach with the selected classification algorithms.
XGBoost is employed for model integration.
The ensemble model achieves improved accuracy, successfully classifying between legitimate SSH traffic and SSH password guessing attacks.

Related Results

Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on...
Ocean surface currents reconstruction from microwave radiometers measurements
Ocean surface currents reconstruction from microwave radiometers measurements
Ocean currents are a key component to understanding many oceanic and climatic phenomena and knowledge of them is crucial for both navigation and operational applications. Therefore...
A Systematic Review on Password Guessing Tasks
A Systematic Review on Password Guessing Tasks
Recently, many password guessing algorithms have been proposed, seriously threatening cyber security. In this paper, we systematically review over thirty methods for password guess...
Comparison of Sudden Sensorineural Hearing Loss with Tinnitus and Short-Term Tinnitus
Comparison of Sudden Sensorineural Hearing Loss with Tinnitus and Short-Term Tinnitus
Objective. As one of the common symptoms of sudden sensorineural hearing loss (SSH), tinnitus seriously affects the life and work of SSH patients. The present study is aimed at exp...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
An Enhanced Graphical Password Technique Using Fake Pointers
An Enhanced Graphical Password Technique Using Fake Pointers
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the det...
The contribution of SWOT to the mesoscale eddy activity estimation
The contribution of SWOT to the mesoscale eddy activity estimation
Mesoscale eddies play a significant role in transporting heat, salinity, and nutrients. The sea surface height (SSH) mapped by nadir data, limited by the spatial coverage and resol...
The case for an inclusive scholarly communication infrastructure for social sciences and humanities
The case for an inclusive scholarly communication infrastructure for social sciences and humanities
This article presents a vision for a scholarly communication research infrastructure for social sciences and humanities (SSH). The COVID-19 pandemic has highlighted the pressing ne...

Back to Top