: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic.
Stewart SentanoeHans P. ReiserPublished in: Digit. Investig. (2022)
Keyphrases
- network traffic
- virtual machine
- anomaly detection
- intrusion detection
- operating system
- network security
- intrusion detection system
- network traffic data
- traffic analysis
- network management
- data center
- distributed computing
- internet traffic
- traffic data
- computing resources
- network intrusion detection
- network resources
- network bandwidth
- network monitoring
- detecting anomalous
- multi tasking
- power consumption
- computer systems
- traffic patterns
- information systems
- data mining