Presentation | 2013-03-15 Identifying User Authentication Methods on SSH Sessions Akihiro SATOH, Yutaka NAKAMURA, Takeshi IKENAGA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | A dictionary attack against SSH services is a common security threat. Traditional ways for detecting the attacks rely on network traffic. The ways capture traffic through observation points and then block a host which has massive sessions. However, the ways cannot correctly detect SSH dictionary attacks because of the similarity between sessions of automated processing through SSH and those of the attacks. In this paper, we resolve this problem by identifying user authentication methods on SSH sessions, and remove sessions which employ non-keystroke based authentication. The reason rests on two perspectives: (1) an SSH dictionary attack targets a host which provides keystroke based authentication; (2) automated processing through SSH needs to support non-keystroke based authentication. Thus, our proposal contributes to improvement in the detection accuracy of the SSH dictionary attacks. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Secure Shell / SSH Dictionary Attack / User Authentication Method / Flow Analysis / Network Management |
Paper # | SITE2012-61,IA2012-99 |
Date of Issue |
Conference Information | |
Committee | SITE |
---|---|
Conference Date | 2013/3/7(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Social Implications of Technology and Information Ethics (SITE) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Identifying User Authentication Methods on SSH Sessions |
Sub Title (in English) | |
Keyword(1) | Secure Shell |
Keyword(2) | SSH Dictionary Attack |
Keyword(3) | User Authentication Method |
Keyword(4) | Flow Analysis |
Keyword(5) | Network Management |
1st Author's Name | Akihiro SATOH |
1st Author's Affiliation | Kyushu Institute of Technology() |
2nd Author's Name | Yutaka NAKAMURA |
2nd Author's Affiliation | Kyushu Institute of Technology |
3rd Author's Name | Takeshi IKENAGA |
3rd Author's Affiliation | Kyushu Institute of Technology |
Date | 2013-03-15 |
Paper # | SITE2012-61,IA2012-99 |
Volume (vol) | vol.112 |
Number (no) | 488 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |