Showing 1 - 6 results of 6 for search '"Secure shell"', query time: 0.06s Refine Results
  1. 1
  2. 2

    Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP by Salwa Deta Mediana, lindawati lindawati, Mohammad Fadhli

    Published 2023-09-01
    “…In order to remove trust presumptions towards the internal network, this study addresses the use of the Zero Trust Model in SSH (Secure Shell) security. The study approach is conducting tests by incorporating the Kerberos and OpenLDAP protocols into the SSH infrastructure. …”
    Get full text
    Article
  3. 3

    Cyber attack evaluation dataset for deep packet inspection and analysis by Shishir Kumar Shandilya, Chirag Ganguli, Ivan Izonin, Prof. Atulya Kumar Nagar

    Published 2023-02-01
    “…Also, services like File Transfer Protocol (FTP) and Secure Shell (SSH) were exploited using several attack mechanisms. …”
    Get full text
    Article
  4. 4

    PEMANFAATAN NOTIFIKASI TELEGRAM UNTUK MONITORING JARINGAN by Febriyanti Panjaitan, Rusmin Syafari

    Published 2019-11-01
    “…Berdasarkan data yang didapat bahwa sistem pada server terdapat port yang cukup banyak terbuka seperti pada port 80 hypertext transfer protocol (http), port 22 secure shell (SSH) dan port 21 ftp server. Untuk mengatasi permasalahan tersebut maka perlu membuat model sistem monitoring serangan pada jaringan menggunakan snort dengan notifikasi Telegram untuk mendeteksi ada atau tidaknya serangan yang masuk kedalam sistem. …”
    Get full text
    Article
  5. 5

    An AI-Powered Network Threat Detection System by Bo-Xiang Wang, Jiann-Liang Chen, Chiao-Lin Yu

    Published 2022-01-01
    “…The Linux system interaction information of SSH (Secure Shell) and Telnet are obtained from the Cowrie Honeypot and labeled according to Enterprise Tactics of MITRE ATT&CK to ensure dataset credibility. …”
    Get full text
    Article
  6. 6

    Implementasi Laboratorium Komputer Virtual Berbasis Cloud – Kelas Pemrograman Berorientasi Obyek by Dwi Susanto, Ridi Ferdiana, Selo Sulistyo

    Published 2022-02-01
    “…Vlab menyajikan virtual machine (VM) yang diakses secara daring dengan aplikasi remote access (Remote Desktop Protocol/RDP, Virtual Network Computing/VNC, Secure Shell/SSH). Vlab dapat menggunakan infrastruktur on-premise maupun infrastruktur public cloud. …”
    Get full text
    Article