-
1
-
2
-
3
Detecting plaintext recovery attack in secure shell (SSH)
Published 2010“…It was discovered lately in the year of 2008. It is known that Secure Shell (SSH) connection is secure enough but this new discovered attack proved that there is vulnerability exist in SSH. …”
Get full text
Thesis -
4
Intrusion detection system in secure shell traffic in cloud environment
Published 2014“…This study investigates a popular attack in Secure Shell (SSH), known as brute force attack and provides an efficient method to detect this attack. …”
Get full text
Article -
5
-
6
-
7
-
8
-
9
The Illustrated network : How TCP/IP Works in a Modern Network /
Published 2017“…Part I: Networking basics --Protocols and layers --TCP/IP protocols and devices --Network link technologies --Packet optical networks and forward error correction --Part II: Core protocols --IPv4 and IPv6 addressing --Address resolution protocol --IPv4 and IPv6 headers --Internet control message protocol --Routing --Forwarding IP Packets --User datagram protocol --Transmission control protocol --Multiplexing and sockets --Part III: Routing and routing protocols --Routing and peering --IGPs: RIP, OSPF, and IS-IS --Border gateway protocol --Expanded uses for BGP --Multicast --Part IV: Switching to VPNs --MPLS and IP switching --MPLS-based virtual private networks --EVPN and VXLAN --Part V: Application level --Dynamic host configuration protocol --The domain name system --File transfer protocol --SMTP and email --Hypertext transfer protocol --Securing sockets with SSL --Part VI: Network management --Simple network management protocol --Cloud, SDN, and NFV --Part VII: Security --Secure shell (remote access) --Network address translation --Firewalls --IP security --Part VIII: Media --Voice over internet protocol…”
-
10
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Conference or Workshop Item -
11
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. Brute Force attack traffic collected in a client-server model is implemented in proposed method. …”
Get full text
Conference or Workshop Item -
12
Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP
Published 2023-09-01“…In order to remove trust presumptions towards the internal network, this study addresses the use of the Zero Trust Model in SSH (Secure Shell) security. The study approach is conducting tests by incorporating the Kerberos and OpenLDAP protocols into the SSH infrastructure. …”
Get full text
Article -
13
Encryption method for SCADA security enhancement
Published 2014“…Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. …”
Get full text
Article -
14
Cyber attack evaluation dataset for deep packet inspection and analysis
Published 2023-02-01“…Also, services like File Transfer Protocol (FTP) and Secure Shell (SSH) were exploited using several attack mechanisms. …”
Get full text
Article -
15
Network digital evidences centralization by using honeynet architecture
Published 2009“…Sebek Sever/ Client Architecture used here to record key loggers have done under encrypted protocols such as Secure Shell (SSH) and then log these recorded data into the data base. …”
Get full text
Thesis -
16
PEMANFAATAN NOTIFIKASI TELEGRAM UNTUK MONITORING JARINGAN
Published 2019-11-01“…Berdasarkan data yang didapat bahwa sistem pada server terdapat port yang cukup banyak terbuka seperti pada port 80 hypertext transfer protocol (http), port 22 secure shell (SSH) dan port 21 ftp server. Untuk mengatasi permasalahan tersebut maka perlu membuat model sistem monitoring serangan pada jaringan menggunakan snort dengan notifikasi Telegram untuk mendeteksi ada atau tidaknya serangan yang masuk kedalam sistem. …”
Get full text
Article -
17
An AI-Powered Network Threat Detection System
Published 2022-01-01“…The Linux system interaction information of SSH (Secure Shell) and Telnet are obtained from the Cowrie Honeypot and labeled according to Enterprise Tactics of MITRE ATT&CK to ensure dataset credibility. …”
Get full text
Article -
18
Implementasi Laboratorium Komputer Virtual Berbasis Cloud – Kelas Pemrograman Berorientasi Obyek
Published 2022-02-01“…Vlab menyajikan virtual machine (VM) yang diakses secara daring dengan aplikasi remote access (Remote Desktop Protocol/RDP, Virtual Network Computing/VNC, Secure Shell/SSH). Vlab dapat menggunakan infrastruktur on-premise maupun infrastruktur public cloud. …”
Get full text
Article