{"id":"https://openalex.org/W3036197589","doi":"https://doi.org/10.1109/icccs49078.2020.9118459","title":"SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches","display_name":"SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches","publication_year":2020,"publication_date":"2020-05-01","ids":{"openalex":"https://openalex.org/W3036197589","doi":"https://doi.org/10.1109/icccs49078.2020.9118459","mag":"3036197589"},"language":"en","primary_location":{"id":"doi:10.1109/icccs49078.2020.9118459","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs49078.2020.9118459","pdf_url":null,"source":{"id":"https://openalex.org/S4306498617","display_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012836895","display_name":"Md Delwar Hossain","orcid":"https://orcid.org/0000-0002-5968-0704"},"institutions":[{"id":"https://openalex.org/I75917431","display_name":"Nara Institute of Science and Technology","ror":"https://ror.org/05bhada84","country_code":"JP","type":"education","lineage":["https://openalex.org/I75917431"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Md Delwar Hossain","raw_affiliation_strings":["Division of Information Science, Nara Institute of Science and Technology, Ikoma, Nara, Japan"],"affiliations":[{"raw_affiliation_string":"Division of Information Science, Nara Institute of Science and Technology, Ikoma, Nara, Japan","institution_ids":["https://openalex.org/I75917431"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045456657","display_name":"Hideya Ochiai","orcid":"https://orcid.org/0000-0002-4568-6726"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hideya Ochiai","raw_affiliation_strings":["Grad. School of Info. Science and Tech., The University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Grad. School of Info. Science and Tech., The University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066157537","display_name":"Doudou Fall","orcid":null},"institutions":[{"id":"https://openalex.org/I75917431","display_name":"Nara Institute of Science and Technology","ror":"https://ror.org/05bhada84","country_code":"JP","type":"education","lineage":["https://openalex.org/I75917431"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Fall Doudou","raw_affiliation_strings":["Division of Information Science, Nara Institute of Science and Technology, Ikoma, Nara, Japan"],"affiliations":[{"raw_affiliation_string":"Division of Information Science, Nara Institute of Science and Technology, Ikoma, Nara, Japan","institution_ids":["https://openalex.org/I75917431"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084740320","display_name":"Youki Kadobayashi","orcid":null},"institutions":[{"id":"https://openalex.org/I75917431","display_name":"Nara Institute of Science and Technology","ror":"https://ror.org/05bhada84","country_code":"JP","type":"education","lineage":["https://openalex.org/I75917431"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Youki Kadobayashi","raw_affiliation_strings":["Division of Information Science, Nara Institute of Science and Technology, Ikoma, Nara, Japan"],"affiliations":[{"raw_affiliation_string":"Division of Information Science, Nara Institute of Science and Technology, Ikoma, Nara, Japan","institution_ids":["https://openalex.org/I75917431"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5012836895"],"corresponding_institution_ids":["https://openalex.org/I75917431"],"apc_list":null,"apc_paid":null,"fwci":6.9385,"has_fulltext":false,"cited_by_count":54,"citation_normalized_percentile":{"value":0.97974564,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"491","last_page":"497"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8383393287658691},{"id":"https://openalex.org/keywords/brute-force","display_name":"Brute force","score":0.7951352596282959},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.6226027607917786},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.6081777811050415},{"id":"https://openalex.org/keywords/file-transfer-protocol","display_name":"File Transfer Protocol","score":0.5795168280601501},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5363864302635193},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5295596718788147},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.45340225100517273},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.4329685568809509},{"id":"https://openalex.org/keywords/c4.5-algorithm","display_name":"C4.5 algorithm","score":0.4206481873989105},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3638956546783447},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.315171480178833},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20162677764892578},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.182673841714859},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08412885665893555},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.07657015323638916}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8383393287658691},{"id":"https://openalex.org/C2986801135","wikidata":"https://www.wikidata.org/wiki/Q1209494","display_name":"Brute force","level":2,"score":0.7951352596282959},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.6226027607917786},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.6081777811050415},{"id":"https://openalex.org/C169485995","wikidata":"https://www.wikidata.org/wiki/Q42283","display_name":"File Transfer Protocol","level":3,"score":0.5795168280601501},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5363864302635193},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5295596718788147},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.45340225100517273},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.4329685568809509},{"id":"https://openalex.org/C52003472","wikidata":"https://www.wikidata.org/wiki/Q1022655","display_name":"C4.5 algorithm","level":4,"score":0.4206481873989105},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3638956546783447},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.315171480178833},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20162677764892578},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.182673841714859},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08412885665893555},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.07657015323638916}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccs49078.2020.9118459","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs49078.2020.9118459","pdf_url":null,"source":{"id":"https://openalex.org/S4306498617","display_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W93284394","https://openalex.org/W2022908805","https://openalex.org/W2030278443","https://openalex.org/W2064675550","https://openalex.org/W2122803863","https://openalex.org/W2133990480","https://openalex.org/W2142839897","https://openalex.org/W2158880761","https://openalex.org/W2282529470","https://openalex.org/W2335999708","https://openalex.org/W2783741806","https://openalex.org/W2789828921","https://openalex.org/W2890574336","https://openalex.org/W2893903497","https://openalex.org/W2908818413","https://openalex.org/W2919021187","https://openalex.org/W2924689635","https://openalex.org/W2934975568","https://openalex.org/W6603789351","https://openalex.org/W6678031633","https://openalex.org/W6695618202","https://openalex.org/W6748420557"],"related_works":["https://openalex.org/W2911792412","https://openalex.org/W2904660175","https://openalex.org/W2951086240","https://openalex.org/W2963351125","https://openalex.org/W4221125739","https://openalex.org/W4220956165","https://openalex.org/W4232572698","https://openalex.org/W2966849126","https://openalex.org/W3013235542","https://openalex.org/W4375930479"],"abstract_inverted_index":{"Network":[0],"traffic":[1],"anomaly":[2],"detection":[3,78,113],"is":[4],"of":[5,17,48,93,126,150],"critical":[6],"importance":[7],"in":[8,66],"cybersecurity":[9],"due":[10],"to":[11,55,59],"the":[12,23,30,33,38,49,81,117,124,127,140,144],"massive":[13],"and":[14,61,74,108,129,132],"rapid":[15],"growth":[16],"sophisticated":[18],"computer":[19],"network":[20],"attacks.":[21],"Indeed,":[22],"more":[24,31],"new":[25],"Internet-related":[26],"technologies":[27],"are":[28],"created,":[29],"elaborate":[32],"attacks":[34,44,65],"become.":[35],"Among":[36],"all":[37],"contemporary":[39],"high-level":[40],"attacks,":[41],"dictionary-based":[42],"brute-force":[43,64,76],"(BFA)":[45],"present":[46],"one":[47],"most":[50],"unsurmountable":[51],"challenges.":[52],"We":[53,115,122],"need":[54],"develop":[56],"effective":[57],"methods":[58],"detect":[60],"mitigate":[62],"such":[63],"realtime.":[67],"In":[68],"this":[69],"paper,":[70],"we":[71,90],"investigate":[72],"SSH":[73],"FTP":[75],"attack":[77],"by":[79],"using":[80],"Long":[82],"Short-Term":[83],"Memory":[84],"(LSTM)":[85],"deep":[86],"learning":[87,95],"approach.":[88],"Additionally,":[89],"made":[91],"use":[92],"machine":[94],"(ML)":[96],"classifiers:":[97],"J48,":[98],"naive":[99],"Bayes":[100],"(NB),":[101],"decision":[102],"table":[103],"(DT),":[104],"random":[105],"forest":[106],"(RF)":[107],"k-nearest-neighbor":[109],"(k-NN),":[110],"for":[111],"additional":[112],"purposes.":[114],"used":[116],"well-known":[118],"labelled":[119],"dataset":[120],"CICIDS2017.":[121],"evaluated":[123],"effectiveness":[125],"LSTM":[128,141],"ML":[130,145],"algorithms,":[131,146],"compared":[133],"their":[134],"performance.":[135],"Our":[136],"results":[137],"show":[138],"that":[139],"model":[142],"outperforms":[143],"with":[147],"an":[148],"accuracy":[149],"99.88%.":[151]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":21},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":10}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
