Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Lee, Jae-Kook
- Brute-force Attacks Analysis against SSH in HPC Multi-user Service Environment
Abstract Views :145 |
PDF Views:0
Authors
Affiliations
1 Department of Supercomputing Infrastructure, KISTI, KP
2 Department of Supercomputing Infrastructure, KISTI, KOREA
1 Department of Supercomputing Infrastructure, KISTI, KP
2 Department of Supercomputing Infrastructure, KISTI, KOREA
Source
Indian Journal of Science and Technology, Vol 9, No 24 (2016), Pagination:Abstract
Background/Objectives: The brute-force attack is one of popular cyber security threats in the secure shell (SSH) service environment. The SANS Institute has warned about SSH brute-force attacks against remote services. Methods/Statistical Analysis: We describe two brute-force attack detection methods are applied in the High Performance Computing (HPC) service environment which has been operated by KISTI in KOREA. The first way parses failed authentication logs of systems. The second way analyze dropped events of network firewalls. Findings: We analyze SSH brute-force attacks that are detected applying these methods in our service environment. The analysis results show that SSH brute-force attacks are classified ‘1:N’ or ‘N:1’ types of attack between source and destination IP address. And a duration of attacks that is generally the time it takes to execute attacks keeps enough long times. Improvements/Applications: Two detection methods which are deployed in our HPC multi-user service environment are complementary to each other. These methods will be also able to apply for other service environment.Keywords
Brute-force Attack, Cyber Attack Analysis, SSH, Supercomputer.- Performance Evaluation and Analysis of Network Firewalls in High Speed Networks
Abstract Views :163 |
PDF Views:0
Authors
Affiliations
1 Korea Institute of Science and Technology Information, KR
1 Korea Institute of Science and Technology Information, KR
Source
Indian Journal of Science and Technology, Vol 8, No 25 (2015), Pagination:Abstract
High speed and high capacity networks are critical for large scale (big) data services. In addition, security issues are even more important. KISTI (Korea Institute of Science and Technology Information) operates a variety of security facilities to provide secure supercomputing services to public users. A throughput of network firewalls affects entire trust networks. Because network firewalls act as the first line of defense against unwanted and malicious traffic flow between each networks. In this paper, we evaluate and compare the performance of two network firewalls are operated by KISTI in high speed networks and analyze results.Keywords
High Speed Network, Network Firewall, Performance Evaluation, Security- Improved Pattern Matching Method for Intrusion Detection Systems under DDoS Attack
Abstract Views :150 |
PDF Views:0
Authors
Affiliations
1 Korea Institute of Science and Technology Information, KR
2 Korea Internet and Security Agency (KrCERT/CC0, KR
1 Korea Institute of Science and Technology Information, KR
2 Korea Internet and Security Agency (KrCERT/CC0, KR