Flow-based detection of RDP brute-force attacks

نویسندگان

  • Martin Vizváry
  • Jan Vykopal
چکیده

The Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a remote access to a computer over a network connection. Recently, we have seen an increase in attacks on Microsoft Windows remote desktop connection authentication. Current detection methods are based on event log analysis or the Account Lockout Policy used in Windows domain networks. However, the methods are applicable only in environment where the devices are under control of the network administrator. We propose attacks detection method based on the network-based approach which provides host independency and highly scalability. The network flow data provides sufficient information about communication of two nodes in network, even though the communication is encrypted. Currently we are able to determine whether a detected IP flow is ordinary remote desktop session or single authentication with a small ratio of false-positive detection. An analysis was based on the network flow data collected in the Masaryk University network and host-based data from logs of a server with opened Remote Desktop Connection. These data helped us to improve the flow detection using the information gathered from the server event log. Despite the fact that RDP is encrypted, flow data gives us a sufficient amount of information to determine whether the connection is an authentication or regular remote desktop session. We implemented the attacks detection as a plugin for the widely used NfSen collector. The plugin is involved in the active defense of the network of Masaryk University. In two months, the plugin detected nearly two million of authentication attempts and reported 3,430 RDP authentication attacks. Despite the fact that attackers IP address was blocked for two days, many of them continued or repeated the attack after the block had been lifted. An analysis of the frequency with which the attackers returned, suggests the suitable duration of settings of blocking of attackers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TOPASE: Detection and Prevention of Brute Force Attacks with Disciplined IPs from IDS Logs

Brute force attacks are used to obtain pairs of user names and passwords illegally by using all existing pairs to login to network services. These are a major security threat faced by network service administrators. In general, to prevent brute force attacks, administrators can set limitations on the number of login trials and shut down the traffic of brute force attacks with an intrusion preve...

متن کامل

Flow-based Brute-force Attack Detection

Brute-force attacks are a prevalent phenomenon that is getting harder to successfully detect on a network level due to increasing volume and encryption of network traffic and growing ubiquity of high-speed networks. Although the research in this field advanced considerably, there still remain classes of attacks that are undetectable. In this chapter, we present several methods for the detection...

متن کامل

Flow-Based Security Issue Detection in Building Automation and Control Networks

The interconnection of building automation and control system networks to public networks has exposed them to a wide range of security problems. This paper provides an overview of the flow data usability to detect security issue in these networks. The flow-based monitoring inside automation and control networks is a novel approach. In this paper, we describe several use cases in which flow moni...

متن کامل

A Denied-Events based Detection Method against SSH Brute-force Attack in Supercomputing Service Environment

The brute-force attack is one of general cyber security threats in supercomputing service environment using a secure shell (SSH) protocol. First we analyzed SSH bruteforce attacks had been detected through the log file parsing method of servers in the KISTI. We found that SSH bruteforce attacks are classified ’1:1’, ’1:N’ or ’N:1’ types of attack between source and destination IP address. And t...

متن کامل

Hidden Markov Model Modeling of SSH Brute-Force Attacks

Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detection has recently become a promising security mechanism. However, since flows do not provide any information on the content of a communication, it also became more difficult to establish a ground truth for flowbased techniques ben...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013