Decrypting live SSH traffic in virtual environments

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing Network Traffic To Detect Self-Decrypting

Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are also evolving. Recent techniques for evasion of exploit detection include polymorphism (code encryption) and metamorphism (code obfuscation). This paper addresses the problem of detecting in network traffic polymorphi...

متن کامل

Predicting Network Traffic for Collaborative Virtual Environments

We introduce a method for predicting the network traffic that will be generated by Collaborative Virtual Environment applications with varying numbers of participants. Statistical analysis of event logs from user trials results in a user behaviour model. Controlled traffic measurements combined with an analysis of the application architecture and network topology results in a system behaviour m...

متن کامل

Cognitive Agents for Microscopic Traffic Simulations in Virtual Environments

Traffic simulations in current open world video games and driving simulators are still limited with respect to the complexity of the behavior of simulated agents. These limitations are typically due to scarce computational resources, but also to the applied methodologies. We suggest adding cognitive components to traffic agents in order to achieve more realistic behavior, such as opting for ris...

متن کامل

Perceptually Robust Traffic Control in Distributed Haptic Virtual Environments

In this paper we present a traffic control scheme for server to client communication in distributed haptic virtual environments (VE). We adopt a client-server architecture where the server manages the state consistency of the distributed VE, while haptic feedback is computed locally at each client. The update rate of network traffic from the server to the client is dynamically adapted by exploi...

متن کامل

Towards Revealing Attackers’ Intent by Automatically Decrypting Network Traffic

Researchers and commercial security companies are constantly improving their techniques to detect and prevent malicious software (malware) proliferation. Unfortunately, at the same time malware authors continuously improve their techniques to evade detection. One recent development in this arms race is the use of encrypted network communication by malware authors to prevent the analysis of malw...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Digital Investigation

سال: 2019

ISSN: 1742-2876

DOI: 10.1016/j.diin.2019.03.010