-
1
-
2
Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP
Published 2023-09-01“…In order to remove trust presumptions towards the internal network, this study addresses the use of the Zero Trust Model in SSH (Secure Shell) security. The study approach is conducting tests by incorporating the Kerberos and OpenLDAP protocols into the SSH infrastructure. …”
Get full text
Article -
3
Cyber attack evaluation dataset for deep packet inspection and analysis
Published 2023-02-01“…Also, services like File Transfer Protocol (FTP) and Secure Shell (SSH) were exploited using several attack mechanisms. …”
Get full text
Article -
4
PEMANFAATAN NOTIFIKASI TELEGRAM UNTUK MONITORING JARINGAN
Published 2019-11-01“…Berdasarkan data yang didapat bahwa sistem pada server terdapat port yang cukup banyak terbuka seperti pada port 80 hypertext transfer protocol (http), port 22 secure shell (SSH) dan port 21 ftp server. Untuk mengatasi permasalahan tersebut maka perlu membuat model sistem monitoring serangan pada jaringan menggunakan snort dengan notifikasi Telegram untuk mendeteksi ada atau tidaknya serangan yang masuk kedalam sistem. …”
Get full text
Article -
5
An AI-Powered Network Threat Detection System
Published 2022-01-01“…The Linux system interaction information of SSH (Secure Shell) and Telnet are obtained from the Cowrie Honeypot and labeled according to Enterprise Tactics of MITRE ATT&CK to ensure dataset credibility. …”
Get full text
Article -
6
Implementasi Laboratorium Komputer Virtual Berbasis Cloud – Kelas Pemrograman Berorientasi Obyek
Published 2022-02-01“…Vlab menyajikan virtual machine (VM) yang diakses secara daring dengan aplikasi remote access (Remote Desktop Protocol/RDP, Virtual Network Computing/VNC, Secure Shell/SSH). Vlab dapat menggunakan infrastruktur on-premise maupun infrastruktur public cloud. …”
Get full text
Article