SSH over SCTP — Optimizing a multi-channel protocol by adapting it to SCTP

@article{Seggelmann2012SSHOS,
  title={SSH over SCTP — Optimizing a multi-channel protocol by adapting it to SCTP},
  author={Robin Seggelmann and Michael T{\"u}xen and Erwin P. Rathgeb},
  journal={2012 8th International Symposium on Communication Systems, Networks \& Digital Signal Processing (CSNDSP)},
  year={2012},
  pages={1-6}
}
  • R. Seggelmann, M. Tüxen, E. Rathgeb
  • Published 18 July 2012
  • Computer Science
  • 2012 8th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP)
Secure Shell (SSH) is a multi-channel security protocol running over the Transmission Control Protocol (TCP), which offers channels for several services over a secured connection, such as remote shells and connection forwarding. In this paper we introduce a method for using SSH over the Stream Control Transmission Protocol (SCTP), a transport protocol supporting multi-homing and multi-streaming. We examine benefits of this adaptation, which can be made available to generic applications with SSH… 
A VPN framework through multi-layer tunnels based on OpenSSH
TLDR
This paper details how to setup and test the new tunneling features of OpenSSH to establish an enhanced SSH Layer 3 VPN between three computers in a Wide Area Network (WAN) environment and positions OpenSSh therefore as a potential alternative to the more conventional OpenVPN.
6to4 tunneling framework using OpenSSH
TLDR
To the best knowledge of the authors, this is the first reported successful implementation of 6to4 tunneling over OpenSSH with more than one client, and positions Open SSH therefore as a potential alternative to conventional VPNs.
Performance evaluation and analysis of layer 3 tunneling between OpenSSH and OpenVPN in a wide area network environment
TLDR
A comprehensive in-depth comparative analysis of the VPN mechanisms is provided and results show that OpenSSH utilizes better the link and significantly improves transfer times.
Automatic Notification and Execution of Security Updates in the Django Web Framework
TLDR
A tool that can be installed on existing Django-applications has been developed and tested that will alert an admin if the current version of the framework is outdated and includes a user interface to help the administrator installing any updates and uncover potential risks by installing the newest version ofThe Django framework.
Graph Theory and Classifying Security Events in Grid Security Gateways
In recent years, the use of security gateways (SG) located within the electrical grid distribution network has become pervasive. SGs in substations and renewable distributed energy resource aggrega...
Humanoid Robot Detecting Animals via Neural Network
TLDR
A neural network that can identify animals is presented - with an existing set of pictures for training, it can recognize any animal and is implemented via Tensorflow on a personal computer.

References

SHOWING 1-10 OF 24 REFERENCES
Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration
TLDR
Extensions to the Stream Control Transmission Protocol (SCTP) are described that provide methods to reconfigure IP address information on an existing association and request that a peer set flow limits in units of bytes or messages, either on a per- stream or per-association basis.
Stream control transmission protocol: Past, current, and future standardization activities
TLDR
The SCTP base protocol and already standardized extensions are introduced and an overview of activities and challenges in the areas of security and concurrent multipath transport is given.
Design and Implementation of a Mobile SSH Protocol
TLDR
With the proposed protocol, the mobile users can switch from one wireless network to another without terminating their SSH sessions, and an application-layer handover mechanism is proposed.
The Secure Shell (SSH) Transport Layer Protocol
TLDR
The SSH transport layer protocol is described, which typically runs on top of TCP/IP, and key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.
Stream scheduling considerations for SCTP
TLDR
This work describes how priority scheduling allows to realize a flow control for every stream without changes to the SCTP protocol, thus allowing the receiver to control the throughput of each stream.
High speed bulk data transfer using the SSH protocol
TLDR
The nature of this limitation, the functional barriers it imposes, a method by which it can be remedied, and a high performance implementation based on the industry standard, OpenSSH are discussed.
The Secure Shell (SSH) Connection Protocol
TLDR
The SSH Connection Protocol provides interactive login sessions, remote execution of commands, forwarded TCP/IP connections, and forwarded X11 connections that are multiplexed into a single encrypted tunnel.
pTCP: an end-to-end transport layer protocol for striped connections
TLDR
pTCP can have a varied range of applications through instantiations in three different environments: (a) bandwidth aggregation on multi-homed mobile hosts; (b) service differentiation using purely end-to-end mechanisms; (c) end-systems based network striping.
The Secure Shell (SSH) Protocol Architecture
TLDR
This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents, and discusses the SSH algorithm naming system that allows local extensions.
The Secure Shell (SSH) Authentication Protocol
TLDR
This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods and further authentication methods are described in separate documents.
...
1
2
3
...