Showing 1 - 3 results of 3 for search '"Secure shell"', query time: 0.07s Refine Results
  1. 1

    Intrusion detection system in secure shell traffic in cloud environment by Barati, Mehdi, Abdullah, Azizol, Udzir, Nur Izura, Behzadi, Mostafa, Mahmod, Ramlan, Mustapha, Norwati

    Published 2014
    “…This study investigates a popular attack in Secure Shell (SSH), known as brute force attack and provides an efficient method to detect this attack. …”
    Get full text
    Article
  2. 2

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Conference or Workshop Item
  3. 3

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. Brute Force attack traffic collected in a client-server model is implemented in proposed method. …”
    Get full text
    Conference or Workshop Item