Abstract
Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detection has recently become a promising security mechanism. However, since flows do not provide any information on the content of a communication, it also became more difficult to establish a ground truth for flow-based techniques benchmarking. A possible approach to overcome this problem is the usage of synthetic traffic traces where the generation of malicious traffic is driven by models. In this paper, we propose a flow time series model of SSH brute-force attacks based on Hidden Markov Models. Our results show that the model successfully emulates an attacker behavior, generating meaningful flow time series. © 2009 Springer-Verlag.
Cite
CITATION STYLE
Sperotto, A., Sadre, R., De Boer, P. T., & Pras, A. (2009). Hidden Markov model modeling of SSH brute-force attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5841 LNCS, pp. 164–176). https://doi.org/10.1007/978-3-642-04989-7_13
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.