How are brute-force attacks identified?

Last updated:2020-06-03 14:20:40

Brute-force attacks on RDP and SSH are identified through log analysis while brute-force attacks on FTP and MySQL are identified through network packet analysis.

Start your cloud journey with Kingsoft Cloud

Sign up