Downloads provided by UsageCounts
Brute-force attacks are a prevalent phenomenon that is getting harder to successfully detect on a network level due to increasing volume and encryption of network traffic and growing ubiquity of high-speed networks. Although research in this field has advanced considerably, there still remain classes of attacks that are undetectable. Since no security measure can guarantee that an attacker will not succeed eventually, intrusion detection techniques should be applied to detect anomalous behavior early and minimize its impacts on network performance caused by the intruders. This research proposed an intrusion detection technique in which the node (server) uses a monitoring software application to monitor the traffic flow on the network and collects relevant statistics about it. By analyzing and comparing the traffic information, the administrator will be able to indicate if any attack is performed or not.
Brute- Force, Wireshark, network, FTP Server.
Brute- Force, Wireshark, network, FTP Server.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 27 | |
| downloads | 16 |

Views provided by UsageCounts
Downloads provided by UsageCounts