Decrypting live SSH traffic in virtual environments
نویسندگان
چکیده
منابع مشابه
Analyzing Network Traffic To Detect Self-Decrypting
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are also evolving. Recent techniques for evasion of exploit detection include polymorphism (code encryption) and metamorphism (code obfuscation). This paper addresses the problem of detecting in network traffic polymorphi...
متن کاملPredicting Network Traffic for Collaborative Virtual Environments
We introduce a method for predicting the network traffic that will be generated by Collaborative Virtual Environment applications with varying numbers of participants. Statistical analysis of event logs from user trials results in a user behaviour model. Controlled traffic measurements combined with an analysis of the application architecture and network topology results in a system behaviour m...
متن کاملCognitive Agents for Microscopic Traffic Simulations in Virtual Environments
Traffic simulations in current open world video games and driving simulators are still limited with respect to the complexity of the behavior of simulated agents. These limitations are typically due to scarce computational resources, but also to the applied methodologies. We suggest adding cognitive components to traffic agents in order to achieve more realistic behavior, such as opting for ris...
متن کاملPerceptually Robust Traffic Control in Distributed Haptic Virtual Environments
In this paper we present a traffic control scheme for server to client communication in distributed haptic virtual environments (VE). We adopt a client-server architecture where the server manages the state consistency of the distributed VE, while haptic feedback is computed locally at each client. The update rate of network traffic from the server to the client is dynamically adapted by exploi...
متن کاملTowards Revealing Attackers’ Intent by Automatically Decrypting Network Traffic
Researchers and commercial security companies are constantly improving their techniques to detect and prevent malicious software (malware) proliferation. Unfortunately, at the same time malware authors continuously improve their techniques to evade detection. One recent development in this arms race is the use of encrypted network communication by malware authors to prevent the analysis of malw...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Digital Investigation
سال: 2019
ISSN: 1742-2876
DOI: 10.1016/j.diin.2019.03.010