Back to Search Start Over

What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks

Authors :
AbdelRahman Abdou
David Barrera
Paul C. van Oorschot
Source :
Technology and Practice of Passwords ISBN: 9783319299372, PASSWORDS
Publication Year :
2016
Publisher :
Springer International Publishing, 2016.

Abstract

We report on what we believe to be the largest dataset (to date) of automated secure shell (SSH) bruteforce attacks. The dataset includes plaintext password guesses in addition to timing, source, and username details, which allows us to analyze attacker behaviour and dynamics (e.g., coordinated attacks and password dictionary sharing). Our methodology involves hosting six instrumented SSH servers in six cities. Over the course of a year, we recorded a total of \(\sim \)17M login attempts originating from 112 different countries and over 6 K distinct source IP addresses. We shed light on attacker behaviour, and based on our findings provide recommendations for SSH users and administrators.

Details

ISBN :
978-3-319-29937-2
ISBNs :
9783319299372
Database :
OpenAIRE
Journal :
Technology and Practice of Passwords ISBN: 9783319299372, PASSWORDS
Accession number :
edsair.doi...........80fa4e5a329ab2eaca7826ae96a9199f