Detecting Brute Force Attacks Using Machine Learning

The importance of identifying network traffic abnormalities in cybersecurity cannot be emphasized enough, particularly considering the growing frequency and complexity of computer network assaults. With the emergence of new Internet-related technology, there is a corresponding increase in complex as...

Full description

Bibliographic Details
Main Authors: Ali Hamza Amer, Jumma surayh Al-Janabi Rana
Format: Article
Language:English
Published: EDP Sciences 2024-01-01
Series:BIO Web of Conferences
Online Access:https://www.bio-conferences.org/articles/bioconf/pdf/2024/16/bioconf_iscku2024_00045.pdf
_version_ 1797213241226559488
author Ali Hamza Amer
Jumma surayh Al-Janabi Rana
author_facet Ali Hamza Amer
Jumma surayh Al-Janabi Rana
author_sort Ali Hamza Amer
collection DOAJ
description The importance of identifying network traffic abnormalities in cybersecurity cannot be emphasized enough, particularly considering the growing frequency and complexity of computer network assaults. With the emergence of new Internet-related technology, there is a corresponding increase in complex assaults. A significant difficulty is dictionary-based brute-force assaults (BFA), which need efficient real-time detection and mitigation techniques. This study explores the detection of SSH and FTP brute-force attacks via the use of the primary objective of our study is to use the machine learning methodology for the identification and detection of SSH and FTP brute-force assaults. Employing many classifiers enables a pretty comprehensive examination of the effectiveness of machine learners in spotting brute force attacks on SSH and FTP. Brute-force attacks are a widely used and perilous technique for acquiring usernames and passwords. Utilizing ethical hacking is a commendable method to assess the impact of a brute-force attack. This article explores several defense tactics and methodologies for using brute-force attacks. The advantages and disadvantages of many defense techniques are listed, along with details on the kind of attack that is most straightforward to recognize. we made use of machine learning (ML) classifiers: Naive Bayes (NB), decision Tree (DT), random forest (RF) Logistic Regression (LG), Quadratic Discriminant Analysis (QDA), Stochastic Gradient Descent (SGD), Linear Discriminant Analysis (LDA), Multi-Layer Perceptron (MLP), we determined that the Random Forest (RF) algorithm achieved the highest level with an accuracy of 99.9%.
first_indexed 2024-04-24T10:55:09Z
format Article
id doaj.art-3db7960d79c04adb87a40d19408b62f1
institution Directory Open Access Journal
issn 2117-4458
language English
last_indexed 2024-04-24T10:55:09Z
publishDate 2024-01-01
publisher EDP Sciences
record_format Article
series BIO Web of Conferences
spelling doaj.art-3db7960d79c04adb87a40d19408b62f12024-04-12T07:36:22ZengEDP SciencesBIO Web of Conferences2117-44582024-01-01970004510.1051/bioconf/20249700045bioconf_iscku2024_00045Detecting Brute Force Attacks Using Machine LearningAli Hamza Amer0Jumma surayh Al-Janabi Rana1College of Computer Science and Information Technology, University of Al-QadisiyahCollege of Computer Science and Information Technology, University of Al-QadisiyahThe importance of identifying network traffic abnormalities in cybersecurity cannot be emphasized enough, particularly considering the growing frequency and complexity of computer network assaults. With the emergence of new Internet-related technology, there is a corresponding increase in complex assaults. A significant difficulty is dictionary-based brute-force assaults (BFA), which need efficient real-time detection and mitigation techniques. This study explores the detection of SSH and FTP brute-force attacks via the use of the primary objective of our study is to use the machine learning methodology for the identification and detection of SSH and FTP brute-force assaults. Employing many classifiers enables a pretty comprehensive examination of the effectiveness of machine learners in spotting brute force attacks on SSH and FTP. Brute-force attacks are a widely used and perilous technique for acquiring usernames and passwords. Utilizing ethical hacking is a commendable method to assess the impact of a brute-force attack. This article explores several defense tactics and methodologies for using brute-force attacks. The advantages and disadvantages of many defense techniques are listed, along with details on the kind of attack that is most straightforward to recognize. we made use of machine learning (ML) classifiers: Naive Bayes (NB), decision Tree (DT), random forest (RF) Logistic Regression (LG), Quadratic Discriminant Analysis (QDA), Stochastic Gradient Descent (SGD), Linear Discriminant Analysis (LDA), Multi-Layer Perceptron (MLP), we determined that the Random Forest (RF) algorithm achieved the highest level with an accuracy of 99.9%.https://www.bio-conferences.org/articles/bioconf/pdf/2024/16/bioconf_iscku2024_00045.pdf
spellingShingle Ali Hamza Amer
Jumma surayh Al-Janabi Rana
Detecting Brute Force Attacks Using Machine Learning
BIO Web of Conferences
title Detecting Brute Force Attacks Using Machine Learning
title_full Detecting Brute Force Attacks Using Machine Learning
title_fullStr Detecting Brute Force Attacks Using Machine Learning
title_full_unstemmed Detecting Brute Force Attacks Using Machine Learning
title_short Detecting Brute Force Attacks Using Machine Learning
title_sort detecting brute force attacks using machine learning
url https://www.bio-conferences.org/articles/bioconf/pdf/2024/16/bioconf_iscku2024_00045.pdf
work_keys_str_mv AT alihamzaamer detectingbruteforceattacksusingmachinelearning
AT jummasurayhaljanabirana detectingbruteforceattacksusingmachinelearning