2008 Proceedings of 17th International Conference on Computer Communications and Networks 2008
DOI: 10.1109/icccn.2008.ecp.122
|View full text |Cite
|
Sign up to set email alerts
|

A Preliminary Look at the Privacy of SSH Tunnels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2008
2008
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(21 citation statements)
references
References 7 publications
0
21
0
Order By: Relevance
“…In our previous work [8] we reported on a preliminary SSH channel model that can be used to help inferring the application layer protocol that is being encrypted over an SSH tunnel. The effectiveness of the technique was evaluated on clear-text flows previously captured from real links and "artificially" encrypted through the model.…”
Section: Related Workmentioning
confidence: 99%
“…In our previous work [8] we reported on a preliminary SSH channel model that can be used to help inferring the application layer protocol that is being encrypted over an SSH tunnel. The effectiveness of the technique was evaluated on clear-text flows previously captured from real links and "artificially" encrypted through the model.…”
Section: Related Workmentioning
confidence: 99%
“…Later in this article, we will illustrate how flow separation yields representations of flows that highly correlate to the ex isting flows. This allows the classification mechanisms described by Dusi et al [2008] to be applied effectively on aggregates of tunneled flows.…”
Section: Flow Separation Attack On Wired Anonymous Communication Netwmentioning
confidence: 99%
“…As a practical example, Dusi et al [2008] describe the difficulty of classifying traffic over SSH tunnels when multiple flows are multiplexed over the same tunnel. Later in this article, we will illustrate how flow separation yields representations of flows that highly correlate to the ex isting flows.…”
Section: Flow Separation Attack On Wired Anonymous Communication Netwmentioning
confidence: 99%
See 1 more Smart Citation
“…vi. SSH Tunnel or Port-Redirector: (Dusi 2008) A Tunnel in Internet means a secure data path through an un-trusted network. Depending upon the software and techniques used, tunneling can be accomplished through many ways.…”
Section: Need For E-mail Forensic Investigationmentioning
confidence: 99%