Local system security via SSHD instrumentation

  • Authors:
  • Scott Campbell

  • Affiliations:
  • National Energy Research Scientific, Computing Center, Lawrence Berkeley National Lab

  • Venue:
  • LISA'11 Proceedings of the 25th international conference on Large Installation System Administration
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we describe a method for near real-time identification of attack behavior and local security policy violations taking place over SSH. A rational is provided for the placement of instrumentation points within SSHD based on the analysis of data flow within the OpenSSH application as well as our overall architectural design and design principles. Sample attack and performance analysis examples are also provided.