메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Inoculating SSH Against Address Harvesting

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; NETWORK SECURITY; VIRUSES;

EID: 39049090038     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (33)
  • 2
    • 0029238493 scopus 로고
    • Improving System Security via Proactive Password Checking
    • M. Bishop and D. V. Klein. Improving System Security via Proactive Password Checking. Computers and Security, 14(3):233–249, 1995.
    • (1995) Computers and Security , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1    Klein, D. V.2
  • 5
    • 0016092372 scopus 로고
    • A User Authentication Scheme Not Requiring Secrecy in the Computer
    • A. Evans Jr., W. Kantrowitz, and E. Weiss. A User Authentication Scheme Not Requiring Secrecy in the Computer. Communications of the ACM, 17(8):437–442, 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.8 , pp. 437-442
    • Evans, A.1    Kantrowitz, W.2    Weiss, E.3
  • 8
    • 85180637211 scopus 로고    scopus 로고
    • San Diego Supercomputer Center (SDSC), Telephone correspondence, Jan. 18
    • V. Hazlewood. Security Technologies Manager, San Diego Supercomputer Center (SDSC), Telephone correspondence, Jan. 18, 2005.
    • (2005) Security Technologies Manager
    • Hazlewood, V.1
  • 9
  • 10
    • 78650088153 scopus 로고    scopus 로고
    • Internet Assigned Numbers Authority. IETF, Sept
    • Internet Assigned Numbers Authority. RFC 3330: Special Use IPv4 Addresses. IETF, Sept. 2002.
    • (2002) RFC 3330: Special Use IPv4 Addresses
  • 13
    • 84900141534 scopus 로고    scopus 로고
    • Internet Attack Called Broad and Long Lasting by Investigators
    • May 10
    • J. Markoff and L. Bergman. Internet Attack Called Broad and Long Lasting by Investigators. The New York Times, May 10, 2005.
    • (2005) The New York Times
    • Markoff, J.1    Bergman, L.2
  • 14
    • 0018543411 scopus 로고
    • Password Security: A Case History
    • R. Morris and K. Thompson. Password Security: A Case History. Communications of the ACM, 22(11):594–597, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 15
    • 0003629991 scopus 로고
    • N. I. of Standards and Technology. FIPS PUB 180-1, Apr. 17
    • N. I. of Standards and Technology. Secure Hash Standard. FIPS PUB 180-1, Apr. 17, 1995.
    • (1995) Secure Hash Standard
  • 17
    • 85180636008 scopus 로고    scopus 로고
    • Argonne National Laboratory, Email correspondence, Feb. 4
    • S. C. Pinkerton. Network Solutions Manager, Argonne National Laboratory, Email correspondence, Feb. 4, 2005.
    • (2005) Network Solutions Manager
    • Pinkerton, S. C.1
  • 23
    • 0003545819 scopus 로고    scopus 로고
    • Technical Report CSD-TR-823, Purdue University Department of Computer Sciences
    • E. H. Spafford. The Internet Worm Program: An Analysis. Technical Report CSD-TR-823, Purdue University Department of Computer Sciences, 1998.
    • (1998) The Internet Worm Program: An Analysis
    • Spafford, E. H.1
  • 24
    • 85180623629 scopus 로고    scopus 로고
    • SSH Communications Security. May 18
    • SSH Communications Security. Statement: Secure Shell and Address Harvesting. http://www.ssh.com/company/newsroom/20050518_mit.html, May 18, 2005.
    • (2005) Statement: Secure Shell and Address Harvesting
  • 27
    • 85180633448 scopus 로고    scopus 로고
    • Symantec. Security Response–W32.Lovgate.mm. http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.lovgate@mm.html.
    • Security Response–W32.Lovgate.mm
  • 32
    • 0038223020 scopus 로고    scopus 로고
    • Technical report, University of California at San Diego Department of Computer Science and Engineering, Nov
    • B. S. Yee and M. Bellare. Forward Integrity for Secure Audit Logs. Technical report, University of California at San Diego Department of Computer Science and Engineering, Nov. 1997.
    • (1997) Forward Integrity for Secure Audit Logs
    • Yee, B. S.1    Bellare, M.2
  • 33
    • 85180625106 scopus 로고    scopus 로고
    • The National Center for Supercomputing Applications (NCSA), Telephone correspondence, Jan. 28
    • W. Yurcik. Senior Systems Security Engineer, The National Center for Supercomputing Applications (NCSA), Telephone correspondence, Jan. 28, 2005.
    • (2005) Senior Systems Security Engineer
    • Yurcik, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.