Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach.
Abel Z. AggheyLunodzo J. MwinukaSanket M. PandhareMussa Ally DidaJema David NdibwilePublished in: Symmetry (2021)
Keyphrases
- machine learning
- pattern recognition
- false alarms
- object detection
- attack detection
- decision trees
- countermeasures
- learning algorithm
- key exchange protocol
- authentication protocol
- detection rate
- machine learning algorithms
- detection method
- detection algorithm
- knowledge acquisition
- false positives
- machine learning methods
- search space
- reinforcement learning
- denial of service attacks
- lightweight
- natural language processing
- support vector machine
- automatic detection
- computer science
- feature selection
- artificial intelligence
- attack scenarios
- key agreement