Call of Papers for Current Volume **************** OnLine Submission of Paper

Volume & Issue no: Volume 4, Issue 3, March 2015


Author Name:
ABSTRACT This paper is focused on the evolution of SSH, the need for SSH, working of SSH, its major components and features of SSH. As the number of users over the Internet is increasing, there is a greater threat of your data being vulnerable. Secure Shell (SSH) Protocol provides a secure method for remote login and other secure network services over an insecure network. The SSH protocol has been designed to support many features along with proper security. This architecture with the help of its inbuilt layers which are independent of each other provides user authentication, integrity, and confidentiality, connectionoriented end to end delivery, multiplexes encrypted tunnel into several logical channels, provides datagram delivery across multiple networks and may optionally provide compression. Here, we have also described in detail what every layer of the architecture does along with the connection establishment. Some of the threats which Ssh can encounter, applications, advantages and disadvantages have also been mentioned in this document. Keywords: SSH, Cryptography, Port Forwarding, Secure SSH Tunnel, Key Exchange, IP spoofing, Connection- Hijacking
Cite this article:
ANOOSHA GARIMELLA, D.RAKESH KUMAR , " SECURE SHELL- ITS SIGNIFICANCE IN NETWORKING (SSH)" , International Journal of Application or Innovation in Engineering & Management (IJAIEM) , Volume 4, Issue 3, March 2015 , pp. 187-196 , ISSN 2319 - 4847.
Full Text [PDF]                           Back to Current Issue