Ruambo Francis A, Masanga Elijah E, Lufyagila Beston, Ateya Abdelhamied A, Abd El-Latif Ahmed A, Almousa May, Abd-El-Atty Bassem
School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China.
College of Information Communication and Technology, Mbeya University of Science and Technology (MUST), P.O Box 131, Mbeya, Tanzania.
Sci Rep. 2025 May 28;15(1):18599. doi: 10.1038/s41598-025-01080-5.
Remote Access Services (RAS)-including protocols such as Remote Desktop Protocol (RDP), Secure Shell (SSH), Virtual Network Computing (VNC), Telnet, File Transfer Protocol (FTP), and Secure File Transfer Protocol (SFTP)-are essential to modern network infrastructures, particularly with the rise of remote work and cloud adoption. However, their exposure significantly increases the risk of brute-force attacks (BFA), where adversaries systematically guess credentials to gain unauthorized access. Traditional defenses like IP blocklisting and multifactor authentication (MFA) often struggle with scalability and adaptability to distributed attacks. This study introduces a zero-trust-aligned Software-Defined Perimeter (SDP) architecture that integrates Single Packet Authorization (SPA) for service cloaking and Connection Tracking (ConnTrack) for real-time session analysis. A Docker-based prototype was developed and tested, demonstrating no successful BFA attempts observed, latency reduction by above 10% across all evaluated RAS protocols, and the system CPU utilization reduction by 48.7% under attack conditions without impacting normal throughput. It also proved effective against connection-oriented attacks, including port scanning and distributed denial of service (DDoS) attacks. The proposed architecture offers a scalable and efficient security framework by embedding proactive defense at the authentication layer. This work advances zero-trust implementations and delivers practical, low-overhead protection for securing RAS against evolving cyber threats.
远程访问服务(RAS)——包括诸如远程桌面协议(RDP)、安全外壳协议(SSH)、虚拟网络计算(VNC)、Telnet、文件传输协议(FTP)和安全文件传输协议(SFTP)等协议——对于现代网络基础设施至关重要,尤其是随着远程工作的兴起和云技术的采用。然而,它们的暴露显著增加了暴力攻击(BFA)的风险,攻击者会系统性地猜测凭证以获取未经授权的访问权限。诸如IP阻止列表和多因素身份验证(MFA)等传统防御措施在应对分布式攻击的可扩展性和适应性方面往往存在困难。本研究引入了一种与零信任对齐的软件定义边界(SDP)架构,该架构集成了用于服务伪装的单包授权(SPA)和用于实时会话分析的连接跟踪(ConnTrack)。开发并测试了一个基于Docker的原型,结果表明未观察到成功的BFA尝试,在所有评估的RAS协议中延迟降低了10%以上,并且在攻击条件下系统CPU利用率降低了48.7%,同时不影响正常吞吐量。它还被证明对面向连接的攻击有效,包括端口扫描和分布式拒绝服务(DDoS)攻击。所提出的架构通过在认证层嵌入主动防御提供了一个可扩展且高效的安全框架。这项工作推动了零信任的实施,并为保护RAS免受不断演变的网络威胁提供了实用的、低开销的保护。