Please wait a minute...
New Technology of Library and Information Service  2006, Vol. 1 Issue (4): 60-62    DOI: 10.11925/infotech.1003-3513.2006.04.15
Current Issue | Archive | Adv Search |
Intrusion Detection in SSH
Ding Xiaofeng1   Li Zhouxian2    Liu Binghua Gu Wei Wu Nanning1
1 (Beijing Document Service, Beijing 100036, China)
2 (Management Section of Guard Bureau, General Staff, Beijing 100017, China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

Widespread using  the SSH protocol can greatly reduces the risk of remote computer access by encrypting the transmission of data. At the same time, because of the encrypted data, intrusion detection system based clear data can’t identify the encrypted attack information. This paper outlines the role of SSH and types of intrusion detection, then proposes techniques for an intrusion detection under SSH protocol.

Key wordsSSH      IDS      Signature-based detection      Anomaly-based detection      IDXP     
Received: 24 September 2005      Published: 25 April 2006
: 

TP393

 
Corresponding Authors: Ding Xiaofeng     E-mail: ding-xiaofeng@sohu.com
About author:: Ding Xiaofeng,Li Zhouxian,Liu Binghua,Gu Wei,Wu Nanning

Cite this article:

Ding Xiaofeng,Li Zhouxian,Liu Binghua,Gu Wei,Wu Nanning . Intrusion Detection in SSH. New Technology of Library and Information Service, 2006, 1(4): 60-62.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2006.04.15     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2006/V1/I4/60

1Alexis.Cort. Algorithmbased approaches to intrusion detection and response http://www.sans.org/rr/ whitepapers/detection/1413.php(Accessed Mar.8,2004)
2张杰,戴英侠.SSH协议的发展与应用研究. 计算机工程, 2002,28(10):13-15
3John McHugh,Alan Christie,Julia Allen.Defending Yourself:The Role of Intrusion Detection Systems  IEEE SOFTWARE .2000.10
4唐正军.网络入侵检测系统的设计与实现.北京:电子工业出版社, 2002
5张岩,赵霁.基于SSH的网络安全解决方案现代电子技术,2004,27(1):104-106

[1] Ma Shaobing, Ma Ziwei. Construction of Digital Library Private Cloud Platform and Application Development[J]. 现代图书情报技术, 2011, 27(4): 9-16.
[2] Hao Zhangang,Wang Zhengou . A New Clustering Algorithm Based on GA and K-medoids Algorithm[J]. 现代图书情报技术, 2006, 1(5): 44-46.
[3] Hao Jiying,Ren Huiling,Wang Ping,Liu Chengshan,Tang Chuan . Scheme of China Aids Information Portal Based on Concept Map[J]. 现代图书情报技术, 2006, 1(12): 21-24.
[4] Wang Zunxin,Cong Luli. The Application Research in the Network Security of the Library of the Intrusion Detection System[J]. 现代图书情报技术, 2004, 20(6): 67-70.
[5] Ye Peihua,Wang Ping. The Development,Implementation and Evaluation of EAD[J]. 现代图书情报技术, 2004, 20(3): 25-28.
[6] Wang Yufang,Huang Di,Li Xiaoling. The Function and Compare of Retrieval Systems for Database on Web[J]. 现代图书情报技术, 2003, 19(6): 58-60.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn