Brute forcing on secured shell servers emphasising the role of cyber forensics – a quali-quantitative study

Author:

Raj Atul1,Chauhan Mohit2ORCID,Chhoker Virender Kumar3,Rani Mukta2,Singh Bajrang Kumar4ORCID,D’Souza Roshan5,Bodwal Jatin6

Affiliation:

1. School of Social Works, Mangaluru, India

2. Department of Forensic Medicine and Toxicology, Lady Hardinge Medical College & Associated Hospitals, New Delhi, India

3. Department of Forensic Medicine and Toxicology, Rama Medical College – Hospital & Research Centre Rama City, India

4. Department of Forensic Medicine & Toxicology, MGM Medical College, Indore (MP), India

5. Department of Criminology and Forensic Sciences, School of Social Works, Mangaluru, India

6. Department of Forensic Medicine & Toxicology, Deen Dayal Upadhyay Hospital, Delhi, India

Abstract

Background Increasing numbers of cyber attacks threaten us personally and professionally. Cyber crimes include obtaining sensitive information (medical or financial) but may extend to organising heinous crimes including murders and aggravated sexual assaults. A major vector of cyber crimes is brute force attacks on secured shell servers. Aim of study This research highlights the prevalence of the intensity of brute force attacks on secured shell servers via quali-quantitative analysis of cyber attacks. Methodology The brute force attacks were recorded over a period of 20 days with the help of logs taken from five dedicated servers installed in a production environment. Results There were a minimum of 6470 and maximum of 22,715 attacks on a server per day. The total number of attacks on all the servers during the study period was 1,065,920. The brute force attacks were mainly targeted at the service network accounts. Conclusion Growth of the field of cyber forensics is the optimal solution to prevent the malicious use of internet services and the commissioning of crimes by this means.

Publisher

SAGE Publications

Reference21 articles.

1. Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System

2. TOPASE: Detection and Prevention of Brute Force Attacks with Disciplined IPs from IDS Logs

3. Secure Shell (SSH)

4. Talab Z. 11 brute-force attack tools for penetration test, https://geekflare.com/brute-force-attack-tools/ (accessed 27 December 2023).

5. https://www.fireeye.com/cyber-map/threat-map.html (accessed 27 December 2023).

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3