Presentation 2013-03-15
Identifying User Authentication Methods on SSH Sessions
Akihiro SATOH, Yutaka NAKAMURA, Takeshi IKENAGA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) A dictionary attack against SSH services is a common security threat. Traditional ways for detecting the attacks rely on network traffic. The ways capture traffic through observation points and then block a host which has massive sessions. However, the ways cannot correctly detect SSH dictionary attacks because of the similarity between sessions of automated processing through SSH and those of the attacks. In this paper, we resolve this problem by identifying user authentication methods on SSH sessions, and remove sessions which employ non-keystroke based authentication. The reason rests on two perspectives: (1) an SSH dictionary attack targets a host which provides keystroke based authentication; (2) automated processing through SSH needs to support non-keystroke based authentication. Thus, our proposal contributes to improvement in the detection accuracy of the SSH dictionary attacks.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Secure Shell / SSH Dictionary Attack / User Authentication Method / Flow Analysis / Network Management
Paper # SITE2012-61,IA2012-99
Date of Issue

Conference Information
Committee SITE
Conference Date 2013/3/7(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Social Implications of Technology and Information Ethics (SITE)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Identifying User Authentication Methods on SSH Sessions
Sub Title (in English)
Keyword(1) Secure Shell
Keyword(2) SSH Dictionary Attack
Keyword(3) User Authentication Method
Keyword(4) Flow Analysis
Keyword(5) Network Management
1st Author's Name Akihiro SATOH
1st Author's Affiliation Kyushu Institute of Technology()
2nd Author's Name Yutaka NAKAMURA
2nd Author's Affiliation Kyushu Institute of Technology
3rd Author's Name Takeshi IKENAGA
3rd Author's Affiliation Kyushu Institute of Technology
Date 2013-03-15
Paper # SITE2012-61,IA2012-99
Volume (vol) vol.112
Number (no) 488
Page pp.pp.-
#Pages 6
Date of Issue