Detection of Severe SSH Attacks Using Honeypot Servers and Machine Learning Techniques

  • et al.
N/ACitations
Citations of this article
29Readers
Mendeley users who have this article in their library.

Abstract

There are attacks on or using an SSH server – SSH port scanning, SSH brute-force attack, and attack using a compromised server. Attacks using a server could be DoS attack, Phishing attack, E-mail spamming and so on. Sometimes an attacker breaks into a public SSH server and uses it for the above activities. Mostly, it is hard to detect the compromised SSH servers that were used by the attackers. However, by analysing the system logs an organisation can know about the compromises. For an organisation holding several SSH servers, it would be tedious to analyse the log files manually.Also, high-speed networks demand better mechanisms to detect the compromises. In this paper, we detect a compromisedSSH session that is carrying out malicious activities. We use flow-based approach and machine learning techniques to detect a compromised session. In a flow-based approach, individual packets are not scrutinised. Hence, it works better on a high-speed network. The data is extracted from a distributed honeypot. The paper also describes the machine learning techniques with appropriate parameters and feature selection technique. A real-time detection model that is tested on a public server is also presented. Several analyses proved that J48 decision tree algorithm and the PART algorithm are best suited for detection of SSH compromises. It was inferred that inter-arrival time between packets and the size ofa packet payload play a significant role in detecting compromises.

Cite

CITATION STYLE

APA

Sadasivam, G. K., Hota, C., & Anand, B. (2017). Detection of Severe SSH Attacks Using Honeypot Servers and Machine Learning Techniques. Software Networking, 2017(1), 79–100. https://doi.org/10.13052/jsn2445-9739.2017.005

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free