Flow-based detection of RDP brute-force attacks
نویسندگان
چکیده
The Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a remote access to a computer over a network connection. Recently, we have seen an increase in attacks on Microsoft Windows remote desktop connection authentication. Current detection methods are based on event log analysis or the Account Lockout Policy used in Windows domain networks. However, the methods are applicable only in environment where the devices are under control of the network administrator. We propose attacks detection method based on the network-based approach which provides host independency and highly scalability. The network flow data provides sufficient information about communication of two nodes in network, even though the communication is encrypted. Currently we are able to determine whether a detected IP flow is ordinary remote desktop session or single authentication with a small ratio of false-positive detection. An analysis was based on the network flow data collected in the Masaryk University network and host-based data from logs of a server with opened Remote Desktop Connection. These data helped us to improve the flow detection using the information gathered from the server event log. Despite the fact that RDP is encrypted, flow data gives us a sufficient amount of information to determine whether the connection is an authentication or regular remote desktop session. We implemented the attacks detection as a plugin for the widely used NfSen collector. The plugin is involved in the active defense of the network of Masaryk University. In two months, the plugin detected nearly two million of authentication attempts and reported 3,430 RDP authentication attacks. Despite the fact that attackers IP address was blocked for two days, many of them continued or repeated the attack after the block had been lifted. An analysis of the frequency with which the attackers returned, suggests the suitable duration of settings of blocking of attackers.
منابع مشابه
TOPASE: Detection and Prevention of Brute Force Attacks with Disciplined IPs from IDS Logs
Brute force attacks are used to obtain pairs of user names and passwords illegally by using all existing pairs to login to network services. These are a major security threat faced by network service administrators. In general, to prevent brute force attacks, administrators can set limitations on the number of login trials and shut down the traffic of brute force attacks with an intrusion preve...
متن کاملFlow-based Brute-force Attack Detection
Brute-force attacks are a prevalent phenomenon that is getting harder to successfully detect on a network level due to increasing volume and encryption of network traffic and growing ubiquity of high-speed networks. Although the research in this field advanced considerably, there still remain classes of attacks that are undetectable. In this chapter, we present several methods for the detection...
متن کاملFlow-Based Security Issue Detection in Building Automation and Control Networks
The interconnection of building automation and control system networks to public networks has exposed them to a wide range of security problems. This paper provides an overview of the flow data usability to detect security issue in these networks. The flow-based monitoring inside automation and control networks is a novel approach. In this paper, we describe several use cases in which flow moni...
متن کاملA Denied-Events based Detection Method against SSH Brute-force Attack in Supercomputing Service Environment
The brute-force attack is one of general cyber security threats in supercomputing service environment using a secure shell (SSH) protocol. First we analyzed SSH bruteforce attacks had been detected through the log file parsing method of servers in the KISTI. We found that SSH bruteforce attacks are classified ’1:1’, ’1:N’ or ’N:1’ types of attack between source and destination IP address. And t...
متن کاملHidden Markov Model Modeling of SSH Brute-Force Attacks
Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detection has recently become a promising security mechanism. However, since flows do not provide any information on the content of a communication, it also became more difficult to establish a ground truth for flowbased techniques ben...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013