This paper presents a study of successful dictionary attacks
against a SSH server and their network-based detection. On the
basis of experience in the protection of university network we
developed a detection algorithm based on a generic SSH
authentication pattern. Thanks to the network-based approach,
the detection algorithm is host independent and highly
scalable. We deployed a high-interaction honeypot based on
VMware to validate the SSH dictionary attack pattern that is
able to recognize a successful attack. The honeypot provides
several user accounts secured by both weak and strong
passwords. All the communication between the honeypot and other
hosts was logged at the host and even network layer (the
relevant NetFlow data were stored too). After successful or
unsuccessful break-in attempt, we could reliably determine
detection accuracy (the false positive and negative rate). The
pattern was implemented using a dynamic decision tree
technique, so we can propose some modifications of its
parameters based on the results. In addition, we could validate
the improved pattern because the detection relies only on the
NetFlow data. This study also discusses the performance details
of detection method and reveals methods and behaviour of
present successful attackers. Next, these findings are compared
to the conclusions of the previous study. In our future work,
we will focus on an extension of the detection method to other
network services and protocols than SSH. Further, the method
should also provide some reasons for the decision that the
attack occurred (e. g., distributed dictionary attack).
[1]
Brian Trammell,et al.
Bidirectional Flow Export Using IP Flow Information Export (IPFIX)
,
2008,
RFC.
[2]
Robin Berthier,et al.
Profiling Attacker Behavior Following SSH Compromises
,
2007,
37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[3]
Benoit Claise,et al.
Cisco Systems NetFlow Services Export Version 9
,
2004,
RFC.
[4]
Marc Dacier,et al.
Lessons learned from the deployment of a high-interaction honeypot
,
2006,
2006 Sixth European Dependable Computing Conference.
[5]
Jan Vykopal,et al.
Network-Based Dictionary Attack Detection
,
2009,
2009 International Conference on Future Networks.