Byron Guanochanga, Rolando Cachipuendo, Walter Fuertes, Santiago Salvador, Diego S. Benítez, Theofilos Toulkeridis, Jenny Torres, César Villacís, Freddy Tapia, Fausto Meneses,
... processing nodes within flat files, and sent via SSH File Transfer Protocol (SFTP) as a restore operation in case the ...
Tópico(s): Water Quality Monitoring Technologies
2018 - Springer Nature | Advances in intelligent systems and computing
Shishir Kumar Shandilya, Chirag Ganguli, Ivan Izonin, Atulya K. Nagar,
... foreign packages including malicious ones. Also, services like File Transfer Protocol (FTP) and Secure Shell (SSH) were exploited using several attack mechanisms. The presented ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2022 - Elsevier BV | Data in Brief
Kyoung-Lyoon Kim, Myung‐Sup Kim, Hyoung-Joong Kim,
... SSH(Secure Shell) 프로토콜을 분석하고 SSH 터널링, SFTP(SSH File Transfer Protocol)와 일반 SSH 트래픽의 차이점을 분석하고 식별할 수 있는 방법을 제시하고 ...
Tópico(s): Network Packet Processing and Optimization
2012 - THE KOREAN INSTITUTE OF COMMUNICATIONS AND INFORMATION SCIENCES (KICS) | The Journal of Korean Institute of Communications and Information Sciences
Secure Shell(SSH)protocol can ensure the implementation of network file transfer between the local host and remote host,remote login,executing commands remotely and safe execution of other applications.It plays an important role in the protecting network security.This paper studies the security of the protocol.The main content of this article is the automated analysis of Secure Shell Version2(SSHV2)protocol.This paper introduces the architecture of SSH protocol and gets the message terms by analyzing ...
Tópico(s): Access Control and Trust
2015 - East China Computer Technology Research Institute | Jisuanji gongcheng
P. Tallada-Crespí, Gerard Bernabeu, Marc Caubet, M. Delfino, Francisco Javier Jiménez Martínez, C. Neissner, Maria A. Rodriguez, N. Tonello,
... data connection is limited to the Secure Shell (SSH) protocol using the scp command. Besides a limitof bandwidth, we had to deal with a lack of automation and reliability of the transfers. PIC managed to control those scp transfers through gLite's File Transfer Service (FTS). Therefore, the discs containing the data at the BSC are mounted via SSH to a local Storage Resource Management (SRM) server at PIC. Once established the access to the data through the SRM server, the data can be transfered to any other SRM server, including the storage system at PIC, using grid protocols. Although we cannot improve the bandwidth, we reach ...
Tópico(s): Distributed systems and fault tolerance
2011 - IOP Publishing | Journal of Physics Conference Series
Andrew Simmons, J‐Sebastian Muehlboeck, Eric Westman,
... public clouds. Data transfers are automated using the SSH-2 protocol. The system provides a framework for effective collaborations and resource sharing. It facilitates access to data at all levels, by providing pertinent meta information about image acquisitions, allowing to extract individual series in various formats from DICOM studies and offering direct file download and transfer to workstations for source data and processed output. ...
Tópico(s): Distributed and Parallel Computing Systems
2014 - Wiley | Alzheimer s & Dementia
Lei Qian, Yinlong Liu, Yanfei Zhang,
... example File Transfer Protocol (FTP) is designed for file transfer. Therefore every application layer protocol has different performance expectations. In this paper, we try to observe that whether characteristics existence in different application layer protocols by illustrating our performance evaluation result of five different application layer protocols (HTTP, HTTPS, FTP, SMTP, and SSH) in individual flow level from over 10 years IP packets trace files collected from two different locations. Our results show ...
Tópico(s): Network Security and Intrusion Detection
2015 - Springer Science+Business Media | Communications in computer and information science
Jae-Won Ahn, Beom-Jin Choi, Sung-Jin Ok, Jung-Ha Kang, Jae‐Young Kim, Eun-Gi Kim,
... 암호화되어 전송되는 것을 확인하였다. The FTP that provides file transfer capabilities to/from another station cannot provides data confidentialities. The FTPS and SFTP can support a security functionalities. The FTPS needs a SSL layer and SFTP use a functions of SSH. And therefore the FTPS or SFTP needs an additional modules such as SSL or SSH. In this paper, we propose a new Secured FTP protocol that can support the security functions without extra ...
Tópico(s): Internet of Things and Social Network Interactions
2014 - The Korea Academia-Industrial Cooperation Society | Journal of the Korea Academia-Industrial cooperation Society
Maxime Rotival, Jeong‐Hun Ko, Prashant K. Srivastava, Audrey Kerloc’h, Alex Montoya, Claudio Mauro, Peter Faull, Pedro R. Cutillas, Enrico Petretto, Jacques Behmoaras,
... of osteoclast differentiation by combined suppression subtractive hybridization (SSH) and cDNA microarray analysis.DNA Cell Biol. 2002; ...
Tópico(s): Epigenetics and DNA Methylation
2014 - Elsevier BV | Molecular & Cellular Proteomics
Murali Krishna, Pradeep Jamwal, Kosana Sai Chaitanya, B. Vinod Kumar,
... of security risks. So the model that uses SSH for securing channel like intranet/internet which provides ... also finally through the combination of secure shell (ssh) and AES (Counter Mode) not only enhances the ...
Tópico(s): Cryptography and Data Security
2011 - Scientific Research Publishing | Journal of Software Engineering and Applications