Detecting Computers in Cyber Space Maliciously Exploited as SSH Proxies

نویسندگان

  • Idan Morad
  • Asaf Shabtai
چکیده

the source, destination and nature of an attack. This can be done by enabling SSH tunneling to act as a proxy through which the malicious traffic is transmitted (e.g., leaking sensitive data, or command and control communications). As a case in point, the Flame virus detected in 2012 used SSL and SSH for stealing sensitive information and the Duqu virus detected in 2011 used SSH port forwarding to hide the command and control traffic and the IP of the control application.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Current approaches to detecting intrusions

Before the flourishing of the Internet, computers were limited to the walls of the organization where computers were linked to each other but had little contact with computer systems outside. Now, we can reach farther, and can expose and link our computers to the entire world; however, such capabilities have made our privacy and assets vulnerable to cyber space attackers. Fortunately, attacks c...

متن کامل

Modern Prevention: The Role of Virtual Media in Addiction Prevention in Cyber Space

Objective: The attractiveness and expansion of the virtual space among strata of society and the functions of this platform in the commission of drug offenses have prompted authorities to take advantage of this context to develop drug prevention programs. Of course, the functions of this space at the present moment are considered among the effective factors in the tendency towards addiction and...

متن کامل

Sociological Investigation of the Usage of Cyber Space and its Relation with Social Isolation (Case Study: Science and Research Branch Students)

The development and improvement of electronic communication instruments and means in postmodern societies with fast intention has caused further multiplication in meanings and content of the communication itself. On the other hand the involvement of cyber space in our privacy has caused massive personality changes in people particularly the youth, In a way that individuals are separated from re...

متن کامل

Using Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media

Social media allows people interact to express their thoughts or feelings about different subjects. However, some of users may write offensive twits to other via social media which known as cyber bullying. Successful prevention depends on automatically detecting malicious messages. Automatic detection of bullying in the text of social media by analyzing the text "twits" via one of the machine l...

متن کامل

Cyber Warfare Simulation to Prepare to Control Cyber Space

ccurate simulation of cyber warfare can prepare decision-makers for its challenges. With cyber warfare, it is possible to control an adversaries’ information, target the portions of cyber space used for situational awareness and decision-making, lead the adversary to make desired decisions, and strike directly at the opposition’s mind. A cyber attack diminishes individual and group situational ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015