The method of detecting online password attacks based on high-level protocol analysis and clustering techniques

12/04/2019
by   Nguyen Hong Son, et al.
0

Although there have been many solutions applied, the safety challenges related to the password security mechanism are not reduced. The reason for this is that while the means and tools to support password attacks are becoming more and more abundant, the number of transaction systems through the Internet is increasing, and new services systems appear. For example, IoT also uses password-based authentication. In this context, consolidating password-based authentication mechanisms is critical, but monitoring measures for timely detection of attacks also play an important role in this battle. The password attack detection solutions being used need to be supplemented and improved to meet the new situation. In this paper we propose a solution that automatically detects online password attacks in a way that is based solely on the network, using unsupervised learning techniques and protected application orientation. Our solution, therefore, minimizes dependence on the factors encountered by host-based or supervised learning solutions. The certainty of the solution comes from using the results of an in-depth analysis of attack characteristics to build the detection capacity of the mechanism. The solution was implemented experimentally on the real system and gave positive results.

READ FULL TEXT

page 7

page 10

page 11

research
01/19/2018

IoT Security Techniques Based on Machine Learning

Internet of things (IoT) that integrate a variety of devices into networ...
research
09/04/2018

Exploiting SNMP-MIB Data to Detect Network Anomalies using Machine Learning Techniques

The exponential increase in the number of malicious threats on computer ...
research
09/28/2018

Explainable Black-Box Attacks Against Model-based Authentication

Establishing unique identities for both humans and end systems has been ...
research
05/28/2019

Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics

Mouse dynamics is a potential means of authenticating users. Typically, ...
research
11/17/2020

Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks

As a fundamental communicative service, email is playing an important ro...
research
12/09/2019

Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools

Protocol detection is the process of determining the application layer p...
research
02/07/2019

Shoulder Surfing: From An Experimental Study to a Comparative Framework

Shoulder surfing is an attack vector widely recognized as a real threat ...

Please sign up or login with your details

Forgot password? Click here to reset