Abstract | ||
---|---|---|
This paper analyses the forensic data on credential stealing incidents over a period of 5 years across 5000 machines monitored at the National Center for Supercomputing Applications at the University of Illinois. The analysis conducted is the first attempt in an open operational environment (i) to evaluate the intricacies of carrying out SSH-based credential stealing attacks, (ii) to highlight and quantify key characteristics of such attacks, and (iii) to provide the system level characterization of such incidents in terms of distribution of alerts and incident consequences. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1109/NSS.2010.56 | Network and System Security |
Keywords | Field | DocType |
credential stealing attacks,open operational environment,supercomputing applications,open networked environment,national center,key characteristic,ssh-based credential,incident consequence,system level characterization,forensic data,computer network security,intrusion detection,linux,detectors,open systems,forensics,authentication,computer forensics | Internet privacy,Authentication,Computer forensics,Computer security,Computer science,Incident analysis,Network security,Open system (systems theory),Intrusion detection system,Credential,System level | Conference |
ISBN | Citations | PageRank |
978-0-7695-4159-4 | 8 | 0.63 |
References | Authors | |
7 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sharma, A. | 1 | 8 | 0.63 |
Zbigniew Kalbarczyk | 2 | 1896 | 159.48 |
Ravishankar K. Iyer | 3 | 3489 | 504.32 |
Barlow, J. | 4 | 8 | 0.63 |