Local System Security via SSHD Instrumentation.

LISA'11: Proceedings of the 25th international conference on Large Installation System Administration(2011)

引用 1|浏览278
暂无评分
摘要
In this paper we describe a method for near real-time identification of attack behavior and local security policy violations taking place over SSH. A rational is provided for the placement of instrumentation points within SSHD based on the analysis of data flow within the OpenSSH application as well as our overall architectural design and design principles. Sample attack and performance analysis examples are also provided.
更多
查看译文
关键词
attack behavior,design principle,overall architectural design,performance analysis example,sample attack,OpenSSH application,data flow,instrumentation point,local security policy violation,near real-time identification,SSHD instrumentation,local system security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要