Analysis of Credential Stealing Attacks in an Open Networked Environment

A. Sharma, Z. Kalbarczyk, R. Iyer, J. Barlow
2010 2010 Fourth International Conference on Network and System Security  
This paper analyses the forensic data on credential stealing incidents over a period of 5 years across 5000 machines monitored at the National Center for Supercomputing Applications at the University of Illinois. The analysis conducted is the first attempt in an open operational environment (i) to evaluate the intricacies of carrying out SSH-based credential stealing attacks, (ii) to highlight and quantify key characteristics of such attacks, and (iii) to provide the system level
more » ... evel characterization of such incidents in terms of distribution of alerts and incident consequences.
doi:10.1109/nss.2010.56 dblp:conf/nss/SharmaKIB10 fatcat:qa6bmpffmzgmra3hghbvf6cs64