Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Brute-force attack mitigation on remote access services via software-defined perimeter
by
Masanga, Elijah E.
, Abd El-Latif, Ahmed A.
, Ruambo, Francis A.
, Almousa, May
, Ateya, Abdelhamied A.
, Abd-El-Atty, Bassem
, Lufyagila, Beston
in
639/166/987
/ 639/705/117
/ Adaptability
/ Brute-force attacks
/ Embedding
/ Humanities and Social Sciences
/ Latency
/ multidisciplinary
/ Protocol
/ Remote access services (RAS)
/ Remote searching
/ Science
/ Science (multidisciplinary)
/ Single packet authorization (SPA)
/ Software-defined perimeter (SDP)
/ Zero-trust architecture
2025
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Brute-force attack mitigation on remote access services via software-defined perimeter
by
Masanga, Elijah E.
, Abd El-Latif, Ahmed A.
, Ruambo, Francis A.
, Almousa, May
, Ateya, Abdelhamied A.
, Abd-El-Atty, Bassem
, Lufyagila, Beston
in
639/166/987
/ 639/705/117
/ Adaptability
/ Brute-force attacks
/ Embedding
/ Humanities and Social Sciences
/ Latency
/ multidisciplinary
/ Protocol
/ Remote access services (RAS)
/ Remote searching
/ Science
/ Science (multidisciplinary)
/ Single packet authorization (SPA)
/ Software-defined perimeter (SDP)
/ Zero-trust architecture
2025
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Brute-force attack mitigation on remote access services via software-defined perimeter
by
Masanga, Elijah E.
, Abd El-Latif, Ahmed A.
, Ruambo, Francis A.
, Almousa, May
, Ateya, Abdelhamied A.
, Abd-El-Atty, Bassem
, Lufyagila, Beston
in
639/166/987
/ 639/705/117
/ Adaptability
/ Brute-force attacks
/ Embedding
/ Humanities and Social Sciences
/ Latency
/ multidisciplinary
/ Protocol
/ Remote access services (RAS)
/ Remote searching
/ Science
/ Science (multidisciplinary)
/ Single packet authorization (SPA)
/ Software-defined perimeter (SDP)
/ Zero-trust architecture
2025
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Brute-force attack mitigation on remote access services via software-defined perimeter
Journal Article
Brute-force attack mitigation on remote access services via software-defined perimeter
2025
Request Book From Autostore
and Choose the Collection Method
Overview
Remote Access Services (RAS)—including protocols such as Remote Desktop Protocol (RDP), Secure Shell (SSH), Virtual Network Computing (VNC), Telnet, File Transfer Protocol (FTP), and Secure File Transfer Protocol (SFTP)—are essential to modern network infrastructures, particularly with the rise of remote work and cloud adoption. However, their exposure significantly increases the risk of brute-force attacks (BFA), where adversaries systematically guess credentials to gain unauthorized access. Traditional defenses like IP blocklisting and multifactor authentication (MFA) often struggle with scalability and adaptability to distributed attacks. This study introduces a zero-trust-aligned Software-Defined Perimeter (SDP) architecture that integrates Single Packet Authorization (SPA) for service cloaking and Connection Tracking (ConnTrack) for real-time session analysis. A Docker-based prototype was developed and tested, demonstrating no successful BFA attempts observed, latency reduction by above 10% across all evaluated RAS protocols, and the system CPU utilization reduction by 48.7% under attack conditions without impacting normal throughput. It also proved effective against connection-oriented attacks, including port scanning and distributed denial of service (DDoS) attacks. The proposed architecture offers a scalable and efficient security framework by embedding proactive defense at the authentication layer. This work advances zero-trust implementations and delivers practical, low-overhead protection for securing RAS against evolving cyber threats.
Publisher
Nature Publishing Group UK,Nature Publishing Group,Nature Portfolio
This website uses cookies to ensure you get the best experience on our website.