SSH over SCTP — Optimizing a multi-channel protocol by adapting it to SCTP
@article{Seggelmann2012SSHOS, title={SSH over SCTP — Optimizing a multi-channel protocol by adapting it to SCTP}, author={Robin Seggelmann and Michael T{\"u}xen and Erwin P. Rathgeb}, journal={2012 8th International Symposium on Communication Systems, Networks \& Digital Signal Processing (CSNDSP)}, year={2012}, pages={1-6} }
Secure Shell (SSH) is a multi-channel security protocol running over the Transmission Control Protocol (TCP), which offers channels for several services over a secured connection, such as remote shells and connection forwarding. In this paper we introduce a method for using SSH over the Stream Control Transmission Protocol (SCTP), a transport protocol supporting multi-homing and multi-streaming. We examine benefits of this adaptation, which can be made available to generic applications with SSH…
Figures and Tables from this paper
7 Citations
A VPN framework through multi-layer tunnels based on OpenSSH
- Computer ScienceInternational Conference on Computing, Communication & Automation
- 2015
This paper details how to setup and test the new tunneling features of OpenSSH to establish an enhanced SSH Layer 3 VPN between three computers in a Wide Area Network (WAN) environment and positions OpenSSh therefore as a potential alternative to the more conventional OpenVPN.
6to4 tunneling framework using OpenSSH
- Computer Science2015 International Conference on Computing, Communication and Security (ICCCS)
- 2015
To the best knowledge of the authors, this is the first reported successful implementation of 6to4 tunneling over OpenSSH with more than one client, and positions Open SSH therefore as a potential alternative to conventional VPNs.
Performance evaluation and analysis of layer 3 tunneling between OpenSSH and OpenVPN in a wide area network environment
- Computer Science2015 International Conference on Computing, Communication and Security (ICCCS)
- 2015
A comprehensive in-depth comparative analysis of the VPN mechanisms is provided and results show that OpenSSH utilizes better the link and significantly improves transfer times.
Automatic Notification and Execution of Security Updates in the Django Web Framework
- Computer Science
- 2018
A tool that can be installed on existing Django-applications has been developed and tested that will alert an admin if the current version of the framework is outdated and includes a user interface to help the administrator installing any updates and uncover potential risks by installing the newest version ofThe Django framework.
Distributed renewable energy resource trust metrics and secure routing
- Computer ScienceComput. Secur.
- 2020
Graph Theory and Classifying Security Events in Grid Security Gateways
- Computer Science, EngineeringInt. J. Semantic Comput.
- 2020
In recent years, the use of security gateways (SG) located within the electrical grid distribution network has become pervasive. SGs in substations and renewable distributed energy resource aggrega...
Humanoid Robot Detecting Animals via Neural Network
- Computer Science2018 14th Symposium on Neural Networks and Applications (NEUREL)
- 2018
A neural network that can identify animals is presented - with an existing set of pictures for training, it can recognize any animal and is implemented via Tensorflow on a personal computer.
References
SHOWING 1-10 OF 24 REFERENCES
Stream control transmission protocol: Past, current, and future standardization activities
- Computer ScienceIEEE Communications Magazine
- 2011
The SCTP base protocol and already standardized extensions are introduced and an overview of activities and challenges in the areas of security and concurrent multipath transport is given.
Design and Implementation of a Mobile SSH Protocol
- Computer ScienceTENCON 2006 - 2006 IEEE Region 10 Conference
- 2006
With the proposed protocol, the mobile users can switch from one wireless network to another without terminating their SSH sessions, and an application-layer handover mechanism is proposed.
The Secure Shell (SSH) Transport Layer Protocol
- Computer ScienceRFC
- 2006
The SSH transport layer protocol is described, which typically runs on top of TCP/IP, and key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.
Stream scheduling considerations for SCTP
- Computer ScienceSoftCOM 2010, 18th International Conference on Software, Telecommunications and Computer Networks
- 2010
This work describes how priority scheduling allows to realize a flow control for every stream without changes to the SCTP protocol, thus allowing the receiver to control the throughput of each stream.
High speed bulk data transfer using the SSH protocol
- Computer ScienceMardi Gras Conference
- 2008
The nature of this limitation, the functional barriers it imposes, a method by which it can be remedied, and a high performance implementation based on the industry standard, OpenSSH are discussed.
The Secure Shell (SSH) Connection Protocol
- Computer Science, MathematicsRFC
- 2006
The SSH Connection Protocol provides interactive login sessions, remote execution of commands, forwarded TCP/IP connections, and forwarded X11 connections that are multiplexed into a single encrypted tunnel.
pTCP: an end-to-end transport layer protocol for striped connections
- Computer Science10th IEEE International Conference on Network Protocols, 2002. Proceedings.
- 2002
pTCP can have a varied range of applications through instantiations in three different environments: (a) bandwidth aggregation on multi-homed mobile hosts; (b) service differentiation using purely end-to-end mechanisms; (c) end-systems based network striping.
The Secure Shell (SSH) Protocol Architecture
- Computer ScienceRFC
- 2006
This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents, and discusses the SSH algorithm naming system that allows local extensions.
Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration
- Computer ScienceRFC
- 2007
Extensions to the Stream Control Transmission Protocol (SCTP) are described that provide methods to reconfigure IP address information on an existing association and request that a peer set flow limits in units of bytes or messages, either on a per- stream or per-association basis.
Concurrent Multipath Transfer Using SCTP Multihoming Over Independent End-to-End Paths
- Computer ScienceIEEE/ACM Transactions on Networking
- 2006
This foundation work identifies three negative side- effects of reordering introduced by CMT that must be managed before efficient parallel transfer can be achieved and proposes three algorithms which augment and/or modify current SCTP to counter these side-effects.