期刊文献+

SSH缓冲区溢出漏洞与安全防范探讨 被引量:2

Discussion of SSH Buffer Overflow Loopholes and Security Ward
下载PDF
导出
摘要 安全Shell(SSH:Secure Shell)是一种应用层的安全通信协议,提供通信双方相互间身份的认证、通信数据的加解密处理、数据完整性校验等多种安全服务,按照其实现的功能,可归为一种应用层的虚拟专用网(VPN)协议。本文概要说明了SSH协议的基本概念,然后对SSH会话从发起到结束的整个过程,以及扩展协议进行了深入细致的研究和分析,归纳总结了SSH协议本身存在的若干缺陷和不足,并提出一系列实际操作过程中可以参考的建议;对部分安全漏洞,特别是对缓冲区溢出漏洞,进行了研究、分析,修改了其脆弱性,弥补了漏洞,并嵌入了质询-响应认证方法;同时,根据实际应用的需求,基于Windows平台,实现了SSH协议,方便了系统管理和提高了SSH的可用性。 Safety Shell (SSH : Secure Shell) is an application layer security protocol, provides communication between the two sides of identity authentication, communications data encryption, data integrity verification, and other security services, according to its function, falls into an Application Layer Virtual Private Network (VPN) protocol. This Paper outlines the SSH protocol basic concepts, then launchs from SSH sessions to the end of the whole process and the expansion of the agreement in detail the research and analysis; SSH summarizes the agreement, there is a number of shortcomings and deficiencies, and related work experience, and proposes the proposal that a series of actual work process can refer to;researchs and analyzes some security loopholes, especially for Buffer Overflow Vulnerability, revises its vulnerability to make up for the loopholes, and has embedded authentication methods in response to a question the. In addition, according to the actual needs of the application, based on the Windows platform for the SSH protocol to facilitate management and improve the availability of SSH.
作者 宋阳秋
出处 《计算机科学》 CSCD 北大核心 2008年第4期85-87,90,共4页 Computer Science
关键词 SSH 网络安全 WINDOWS 密码协议 SSH, Network security, Windows, Cryptographic protocol
  • 相关文献

参考文献5

二级参考文献25

  • 1郑纬民 石威.高性能集群计算[M].北京:电子工业出版社,2001..
  • 2E Zadok,I Badulescu,A Shender.CryptFS:A Stackable Vnode Level Encryption File System[EB/OL].http://www.fsl.cs.sunysb.edu/docs/cryptfs/cryptfs.html,1998.
  • 3G Cattaneo,G Persiano.Design and Implementation of a Transparent Cryptographic File System for Unix[EB/OL].http://www.crypto.com/papers/cfs.pdf,1997.
  • 4David Mazieres,Michael Kaminsky,M Frans Kaashoek,et al.Separating Key Management from File System Security[C].Symposium on Operating Systems Principles,1999.124-139.
  • 5Matt Blaze.A Cryptographic File System for Unix[C].Proc.of the 1st ACM Conference on Computer and Communications Security,Fairfax,VA,1993.
  • 6McDonald AD,Kuhn MG.StegFS:A Steganographic File System for Linux[C].Lecture Notes in Computer Science,2000.463-477.
  • 7David Cross,Microsoft.Encrypting File System in Windows XP and Windows Server 2003[EB/OL].http://www.microsoft.com/WindowsXP/pro/techinfo/administration/recovery/,2002.
  • 8Howard Wright.The Encrypting File System,How Secure is It?[EB/OL].http://www.sans.org/rr/whitepapers/win2k/211.php,2001.
  • 9Thomas Anderson,Michael Dahlin,Jeanna Neefe,et al.Serverless Network File Systems[C].Proceedings of the 15th Symposium on Operating System Principles,ACM,1995.109-126
  • 10Russel Sandberg,David Goldberg,Steve Kleiman,et al.Design and Implementation of the Sun Network Filesystem[C].Proc.Summer USENIX Conf.,1985.119-130.

共引文献3

同被引文献12

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部