Identification and Prevention for Brute Force Attack

Authors

  • Veluru Jogi Reddy  Department of Computer Applications, Madanapalle Institute of Technology and Science, Madanapalle, Andhra Pradesh, India
  • Mr. S. Suresh  Department of Computer Applications, Madanapalle Institute of Technology and Science, Madanapalle, Andhra Pradesh, India

Keywords:

Brute Force Attacks, Identification, Prevention Techniques, Network-Based Approaches, Host-Based Approaches.

Abstract

In today's digital age, information security is of paramount importance, and protecting sensitive data from unauthorized access is crucial. Brute force attacks pose a significant danger to system and network security because they use weak passwords and authentication measures to gain unauthorized access. The goal of this research is to look at the detection and prevention of brute force attacks. This paper provides an in-depth analysis of various methods employed in identifying brute force attacks. It examines both network-based and host-based approaches, highlighting their strengths and limitations. Network-based approaches involve monitoring network traffic patterns and detecting abnormal activities, while host-based approaches focus on analyzing system logs and detecting repeated login attempts. Additionally, the study investigates the utilization of machine learning algorithms for improved identification accuracy, considering factors such as user behavior analysis and anomaly detection. Furthermore, this research explores preventive measures to mitigate the risk of brute force attacks. It discusses the importance of strong password policies and multi-factor authentication as fundamental safeguards against such attacks. In addition, the study underlines the importance of account lockout procedures and intrusion detection systems in deterring brute force attacks. The paper also assesses the effectiveness of CAPTCHA methods and rate limiting approaches in preventing automated brute force attacks. To validate the effectiveness of the identification and prevention techniques, the study conducts experiments using real-world datasets and evaluates the performance metrics such as detection accuracy, false positive rates, and computational overhead. The results demonstrate the efficacy of the proposed approaches in detecting and preventing brute force attacks.

References

  1. Bonjak, L.; J Sreš; B Brumen "Animal power and word reference assault on hashed genuine passwords" ,2018 41st Worldwide Show on Data and Correspondence Innovation, Hardware and Microelectronics (MIPRO) pp 1161-1167.
  2. Diego Garcia; Franklin Mayorga; Vargas, Javier; Renato toasa; David Guevara, "The use of anonymous communication in electronic government services: in the prevention of passive attacks on a network,” Proceedings of the 2018 13th Iberian Conference of Information Systems and Technologies (CISTI), pages one through four.
  3. Stiawan, D. S. Sandra; E. Alzahrani; R. Budiarto, "Comparative analysis of the K-Means method and the Naive Bayes method for brute force attack visualization," ICACC 2017, pp. 177-182, 2017.
  4. Kinam Park; Song of Youngrok; “Classification of Attack Types for Intrusion Detection Systems Using a Machine Learning Algorithm,” Yun-Gyung Cheong, pages 282-286, 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService).
  5. Aung Yi Yi; MyatMyat Min, "Half breed Interruption Recognition Framework Utilizing K-Means and Characterization and Relapse Trees Calculations" 2018 IEEE sixteenth Global Meeting on Programming Exploration, The board and Applications (SERA), pp 195-199.
  6. Nabhoneil Chattopadhyay; Souvik Bhattacharya; Rahul Ghosh ; Abhillash Paal , "Information Interruption Discovery with essential Python coding and anticipation of other meddlesome appearance by the utilization of interruption application" , 2018 IEEE 9thAnnual InformationTechnology, Hardware and Portable Correspondence Meeting (IEMCON), pp 1094-1100
  7. Wahal Mrinal; Choudhury, Tanupriya; Manik Arora , "Interruption Identification Framework in Python" , 2018 eighth Worldwide Meeting on Distributed computing, Information Science and Designing (Conjunction) , pp 348-353
  8. The Maulana Ridho Arifianto; Sukarno's Parman; ErwidMusthofaJadied, "An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System," in Proceedings of the 2018 6th International Conference on Information and Communication Technology (ICoICT), pages 409-415
  9. “An improved Linux firewall using a hybrid frame of network,” Nivedita and Rakesh Kumar, 2017 International Conference on Trends in Electronics and Informatics (ICEI), pages 657-662.

Downloads

Published

2023-08-30

Issue

Section

Research Articles

How to Cite

[1]
Veluru Jogi Reddy, Mr. S. Suresh, " Identification and Prevention for Brute Force Attack" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 4, pp.140-145, July-August-2023.