Where The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Them.
Sachin Kumar SinghShreeman GautamCameron CartierSameer PatilRobert RicciPublished in: NSDI (2024)
Keyphrases
- brute force
- computationally expensive
- countermeasures
- search quality
- candidate set
- locality sensitive hashing
- computer chess
- malicious users
- watermarking scheme
- neural network
- security protocols
- watermarking technique
- traffic analysis
- exhaustive search
- attack detection
- security threats
- chosen plaintext
- ddos attacks
- security mechanisms
- watermarking algorithm
- multi objective
- high dimensional
- search engine