Skip to main content
Log in

Detection of stealthy single-source SSH password guessing attacks

  • Original Paper
  • Published:
Evolving Systems Aims and scope Submit manuscript

Abstract

Many of the network services (protocols like SSH, Telnet, HTTP, and FTP) implement password-based authentication for accessing system resources. Malicious entities carry out password guessing attacks to exploit network services. Existing security tools detect aggressive password guessing attacks (i.e., a high number of login attempts in a short duration of time). In order to evade detection, the attackers are guessing the logins in a slow manner (for example, a login attempt every few minutes/hours/days). These attacks are called as stealthy password guessing attacks. These attacks have caused damage to the company’s servers and try to exploit vulnerable IoT devices. The current literature detects stealthy distributed password guessing attacks, but no attempt is made to detect stealthy single-source password guessing attacks. The authors have proposed a cluster-based approach to handle this problem. The model uses a data set obtained from a honeypot system. The clusters are well-formed (high-performance metric), validating the detection of these attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Availability of data and material

Not applicable

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gokul Kannan Sadasivam.

Ethics declarations

Conflict of interest

Not applicable

Funding

Not applicable

Code availability

https://github.com/macgok/detect_ssspga/.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sadasivam, G., Hota, C. & Bhojan, A. Detection of stealthy single-source SSH password guessing attacks. Evolving Systems 13, 1–15 (2022). https://doi.org/10.1007/s12530-020-09360-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12530-020-09360-3

Keywords

Navigation