Art
J-GLOBAL ID:201502289162584340   Reference number:15A0546403

A New Approach to Identify User Authentication Methods toward SSH Dictionary Attack Detection

SSH辞書攻撃検出に向けたユーザ認証法を特定する新方式
Author (3):
Material:
Volume: E98.D  Issue:Page: 760-768 (J-STAGE)  Publication year: 2015 
JST Material Number: U0469A  ISSN: 1745-1361  Document type: Article
Article type: 原著論文  Country of issue: Japan (JPN)  Language: ENGLISH (EN)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

JST classification (3):
JST classification
Category name(code) classified by JST.
Code theory  ,  Data protection  ,  Computer networks 
Reference (35):
  • [1] T. Ylonen, “SSH: Secure login connections over the Internet,” Proc. 6th Conference on USENIX Security Symposium, Focusing on Applications of Cryptography, vol.6, 1996.
  • [2] Net-SSH-Expect, http://www.cpan.org/
  • [3] J. Ouellette, “Paranoid penguin: Managing SSH for scripts and cron jobs,” Linux Journal, no.137, 2005.
  • [4] R. Strubinger, “Shell scripting: A homegrown backup solution utilizing RSA keys, SSH, and tar,” J. Sys. Admin., vol.11, no.4, pp.37-38, 2002.
  • [5] C. Rapier and B. Bennett, “High speed bulk data transfer using the SSH protocol,” Proc. 15th ACM Mardi Gras Conference, no.11, pp.1-7, 2008.
more...
Terms in the title (4):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page