Strategies to Prohibit Intruders Eluding the Detection of Snort through SSH
- Siqing Gao
- Pan Qi
- Dihua Liu
Abstract
This paper introduces a method to avoid the detection of snort, a kind of Network Intrusion Detection System (NIDS) software, by using SSH. It also brings up a synthetic strategy, snort collaborating with Intrusion Detection System based on Host(HIDS),to detect this kind of intrusion.
- Full Text: PDF
- DOI:10.5539/mas.v4n7p183
This work is licensed under a Creative Commons Attribution 4.0 License.
Journal Metrics
(The data was calculated based on Google Scholar Citations)
h5-index (July 2022): N/A
h5-median(July 2022): N/A
Index
- Aerospace Database
- American International Standards Institute (AISI)
- BASE (Bielefeld Academic Search Engine)
- CAB Abstracts
- CiteFactor
- CNKI Scholar
- Elektronische Zeitschriftenbibliothek (EZB)
- Excellence in Research for Australia (ERA)
- JournalGuide
- JournalSeek
- LOCKSS
- MIAR
- NewJour
- Norwegian Centre for Research Data (NSD)
- Open J-Gate
- Polska Bibliografia Naukowa
- ResearchGate
- SHERPA/RoMEO
- Standard Periodical Directory
- Ulrich's
- Universe Digital Library
- WorldCat
- ZbMATH
Contact
- Sunny LeeEditorial Assistant
- mas@ccsenet.org