Network Detection of Interactive {SSH} Impostors Using Deep Learning

J Piet, A Sharma, V Paxson, D Wagner - 32nd USENIX Security …, 2023 - usenix.org
Impostors who have stolen a user's SSH login credentials can inflict significant harm to the
systems to which the user has remote access. We consider the problem of identifying such …

[HTML][HTML] Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack

X Xu, H Hu, Y Liu, J Tan, H Zhang, H Song - Digital Communications and …, 2022 - Elsevier
Eavesdropping attacks have become one of the most common attacks on networks because
of their easy implementation. Eavesdropping attacks not only lead to transmission data …

Acceleration of intrusion detection in encrypted network traffic using heterogeneous hardware

E Papadogiannaki, S Ioannidis - Sensors, 2021 - mdpi.com
More than 75% of Internet traffic is now encrypted, and this percentage is constantly
increasing. The majority of communications are secured using common encryption protocols …

SSH brute force attack mitigation in Internet of Things (IoT) network: An edge device security measure

MM Raikar, SM Meena - 2021 2nd international conference on …, 2021 - ieeexplore.ieee.org
With the explosive growth of IoT applications, billions of things are now connected via edge
devices and a colossal volume of data is sent over the internet. Providing security to the user …

Towards next-generation intrusion detection

R Koch - 2011 3rd International Conference on Cyber Conflict, 2011 - ieeexplore.ieee.org
Today, Intrusion Detection Systems (IDS) are integral components of larger networks. Even
so, security incidents are on a day-to-day basis: Numerous data leakage scandals arouse …

Survey: Intrusion detection systems in encrypted traffic

T Kovanen, G David, T Hämäläinen - … of Things, Smart Spaces, and Next …, 2016 - Springer
Intrusion detection system, IDS, traditionally inspects the payload information of packets.
This approach is not valid in encrypted traffic as the payload information is not available …

Behavior-based intrusion detection in encrypted environments

R Koch, M Golling, GD Rodosek - IEEE Communications …, 2014 - ieeexplore.ieee.org
In recent years the Internet has evolved into a critical communication infrastructure that is
omnipresent in almost all aspects of our daily life. This dependence of modern societies on …

An approach for detecting encrypted insider attacks on OpenFlow SDN Networks

CV Neu, AF Zorzo, AMS Orozco… - 2016 11th International …, 2016 - ieeexplore.ieee.org
Data traffic on the Internet is growing continuously due to the high number of connected
devices and increased number of applications and transactions performed online. To ensure …

Physical‐layer intrusion detection system for smart jamming attacks

A Yousaf, A Loan, RF Babiceanu… - Transactions on …, 2017 - Wiley Online Library
In modern electronic warfare, physical‐layer security threats have evolved from traditional
jammers to smart jammers. Smart jammers, due to their stealthy nature, make wireless …

Command evaluation in encrypted remote sessions

R Koch, GD Rodosek - 2010 Fourth International Conference …, 2010 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) are integral components for the detection of malicious
code and attacks. Detection methods can be differentiated in signature-based and anomaly …