Showing 1 - 18 results of 18 for search '"Secure shell"', query time: 0.13s Refine Results
  1. 1
  2. 2
  3. 3

    Detecting plaintext recovery attack in secure shell (SSH) by Ahmad Baidowi, Zaid Mujaiyid Putra

    Published 2010
    “…It was discovered lately in the year of 2008. It is known that Secure Shell (SSH) connection is secure enough but this new discovered attack proved that there is vulnerability exist in SSH. …”
    Get full text
    Thesis
  4. 4

    Intrusion detection system in secure shell traffic in cloud environment by Barati, Mehdi, Abdullah, Azizol, Udzir, Nur Izura, Behzadi, Mostafa, Mahmod, Ramlan, Mustapha, Norwati

    Published 2014
    “…This study investigates a popular attack in Secure Shell (SSH), known as brute force attack and provides an efficient method to detect this attack. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    The Illustrated network : How TCP/IP Works in a Modern Network / by Goralski, Walter, author

    Published 2017
    “…Part I: Networking basics --Protocols and layers --TCP/IP protocols and devices --Network link technologies --Packet optical networks and forward error correction --Part II: Core protocols --IPv4 and IPv6 addressing --Address resolution protocol --IPv4 and IPv6 headers --Internet control message protocol --Routing --Forwarding IP Packets --User datagram protocol --Transmission control protocol --Multiplexing and sockets --Part III: Routing and routing protocols --Routing and peering --IGPs: RIP, OSPF, and IS-IS --Border gateway protocol --Expanded uses for BGP --Multicast --Part IV: Switching to VPNs --MPLS and IP switching --MPLS-based virtual private networks --EVPN and VXLAN --Part V: Application level --Dynamic host configuration protocol --The domain name system --File transfer protocol --SMTP and email --Hypertext transfer protocol --Securing sockets with SSL --Part VI: Network management --Simple network management protocol --Cloud, SDN, and NFV --Part VII: Security --Secure shell (remote access) --Network address translation --Firewalls --IP security --Part VIII: Media --Voice over internet protocol…”
  10. 10

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Conference or Workshop Item
  11. 11

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. Brute Force attack traffic collected in a client-server model is implemented in proposed method. …”
    Get full text
    Conference or Workshop Item
  12. 12

    Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP by Salwa Deta Mediana, lindawati lindawati, Mohammad Fadhli

    Published 2023-09-01
    “…In order to remove trust presumptions towards the internal network, this study addresses the use of the Zero Trust Model in SSH (Secure Shell) security. The study approach is conducting tests by incorporating the Kerberos and OpenLDAP protocols into the SSH infrastructure. …”
    Get full text
    Article
  13. 13

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. …”
    Get full text
    Article
  14. 14

    Cyber attack evaluation dataset for deep packet inspection and analysis by Shishir Kumar Shandilya, Chirag Ganguli, Ivan Izonin, Prof. Atulya Kumar Nagar

    Published 2023-02-01
    “…Also, services like File Transfer Protocol (FTP) and Secure Shell (SSH) were exploited using several attack mechanisms. …”
    Get full text
    Article
  15. 15

    Network digital evidences centralization by using honeynet architecture by Saleh, Mohammed Abbas Alameen

    Published 2009
    “…Sebek Sever/ Client Architecture used here to record key loggers have done under encrypted protocols such as Secure Shell (SSH) and then log these recorded data into the data base. …”
    Get full text
    Thesis
  16. 16

    PEMANFAATAN NOTIFIKASI TELEGRAM UNTUK MONITORING JARINGAN by Febriyanti Panjaitan, Rusmin Syafari

    Published 2019-11-01
    “…Berdasarkan data yang didapat bahwa sistem pada server terdapat port yang cukup banyak terbuka seperti pada port 80 hypertext transfer protocol (http), port 22 secure shell (SSH) dan port 21 ftp server. Untuk mengatasi permasalahan tersebut maka perlu membuat model sistem monitoring serangan pada jaringan menggunakan snort dengan notifikasi Telegram untuk mendeteksi ada atau tidaknya serangan yang masuk kedalam sistem. …”
    Get full text
    Article
  17. 17

    An AI-Powered Network Threat Detection System by Bo-Xiang Wang, Jiann-Liang Chen, Chiao-Lin Yu

    Published 2022-01-01
    “…The Linux system interaction information of SSH (Secure Shell) and Telnet are obtained from the Cowrie Honeypot and labeled according to Enterprise Tactics of MITRE ATT&CK to ensure dataset credibility. …”
    Get full text
    Article
  18. 18

    Implementasi Laboratorium Komputer Virtual Berbasis Cloud – Kelas Pemrograman Berorientasi Obyek by Dwi Susanto, Ridi Ferdiana, Selo Sulistyo

    Published 2022-02-01
    “…Vlab menyajikan virtual machine (VM) yang diakses secara daring dengan aplikasi remote access (Remote Desktop Protocol/RDP, Virtual Network Computing/VNC, Secure Shell/SSH). Vlab dapat menggunakan infrastruktur on-premise maupun infrastruktur public cloud. …”
    Get full text
    Article