z-logo
open-access-imgOpen Access
Research and Implementation of SSH Proxy System for Filtering and Auditing
Author(s) -
Zhuxiao Wang,
Jiaming Zhang,
Kehe Wu,
Wei Li,
Wenchao Cui
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/2010/1/012055
Subject(s) - computer science , informatization , computer security , process (computing) , protocol (science) , replay attack , audit , system administrator , intrusion detection system , operating system , world wide web , business , medicine , alternative medicine , accounting , pathology , hash function
With the rapid development of information technology and network, the informatization level of enterprises is constantly improving, and the security of information system is becoming more and more important. Not only the external intrusion needs to be effectively resisted, but the operation and maintenance of internal personnel also needs to be under security control. Starting from the internal security of enterprise information system, this paper designs and implements the SSH protocol operation and maintenance audit system based on libssh. The forwarding module of the system can meet the requirements of SSH protocol operation and maintenance, and set command parsing, filtering and recording modules, which can correctly identify the commands executed by users and server data, and addition to filter the forbidden commands. In addition, the setting of replay and monitoring module can record the whole process of personnel’s operation, so as to ensure that the auditors can monitor in real time or replay afterwards. The system ensures the security of the enterprise internal information system.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here