Skip to content

islamazhar/Arana-Public

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Araña: Discovering and Characterizing Password Guessing Attacks in Practice

Araña is a tool for identifying attack campaigns from login logs. We detail the pipeline of this tool in our USENIX Security 2023 paper Araña: Discovering and Characterizing Password Guessing Attacks in Practice. This repository contains a proof of concept implementation of Araña on the login logs collected via our prior work Gossamer (USENIX Security 2022).

Steps to run

  • Create the ip_feature table by following instructions inside ip_feature_table folder
  • To create the Lsets following HFR heuristics and filtering follow the instructions.
  • To run the clustering follow the instructions inside the clustering folder.

Questions?

We are always looking for ways to improve our code and pipeline of our tool. For any bugs/improvements/questions, please feel free to shoot an email at: mislam9@wisc.edu or create a pull request.

Citations

If you use any part of our code or paper please cite our paper.

@inproceedings {islamArayna23,
author = {Mazharul Islam and Marina Sanusi Bohuk and Paul Chung and Thomas Ristenpart and Rahul Chatterjee},
title = {Ara\~{n}a: Discovering and Characterizing Password Guessing Attacks in Practice},
booktitle = {32nd USENIX Security Symposium (USENIX Security 23)},
year = {2023},
isbn = {978-1-939133-37-3},
address = {Anaheim, CA},
pages = {1019--1036},
url = {https://www.usenix.org/conference/usenixsecurity23/presentation/islam},
publisher = {USENIX Association},
month = aug,
}

About

Araña is a tool for identifying attack campaigns from login logs

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages