• English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
  • New user? Click here to register. Have you forgotten your password?
    Research Collection
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
  • New user? Click here to register. Have you forgotten your password?
NM-AIST Repository
  1. Home
  2. Browse by Author

Browsing by Author "andhare, Sanket"

Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Item
    Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach
    (MDPI, 2021-11-17) Agghey, Abel; Mwinuka, Lunodzo; andhare, Sanket; Dida, Mussa; Ndibwile, Jema
    Over the last two decades (2000–2020), the Internet has rapidly evolved, resulting in symmetrical and asymmetrical Internet consumption patterns and billions of users worldwide. With the immense rise of the Internet, attacks and malicious behaviors pose a huge threat to our computing environment. Brute-force attack is among the most prominent and commonly used attacks, achieved out using password-attack tools, a wordlist dictionary, and a usernames list—obtained through a so-called an enumeration attack. In this paper, we investigate username enumeration attack detection on SSH protocol by using machine-learning classifiers. We apply four asymmetrical classifiers on our generated dataset collected from a closed-environment network to build machine-learning-based models for attack detection. The use of several machine-learners offers a wider investigation spectrum of the classifiers’ ability in attack detection. Additionally, we investigate how beneficial it is to include or exclude network ports information as features-set in the process of learning. We evaluated and compared the performances of machine-learning models for both cases. The models used are k-nearest neighbor (K-NN), naïve Bayes (NB), random forest (RF) and decision tree (DT) with and without ports information. Our results show that machine-learning approaches to detect SSH username enumeration attacks were quite successful, with KNN having an accuracy of 99.93%, NB 95.70%, RF 99.92%, and DT 99.88%. Furthermore, the results improve when using ports information.
Other Links
  • Tanzania Research Repository
  • CERN Document Server
  • Confederation of Open Access Repositories
  • Directory of Open Access Books (DOAB)
  • Directory of Open Access Journals (DOAJ)
useful resources
  • Emerald Database
  • Taylor & Francis
  • EBSCO Host
  • Research4Life
  • Elsevier Journal
Contact us
  • library@nm-aist.ac.tz
  • The Nelson Mandela African institution of science and Technology, 404 Nganana, 2331 Kikwe, Arumeru P.O.BOX 447, Arusha

Nelson Mandela - AIST | Copyright © 2025

  • Privacy policy
  • End User Agreement
  • Send Feedback