Computer and Modernization ›› 2010, Vol. 1 ›› Issue (5): 167-169,.doi: 10.3969/j.issn.1006-2475.2010.05.047

• 信息安全 • Previous Articles     Next Articles

Secure Shell Security Model Construction and Its Security Performance Analysis

HUANG Xiao-qiao1, HAN Song2   

  1. 1. Teaching Section of Education Technology and Information of Xuchang University, Xuchang 461000, China;2. Personnel Department of Xuchang University, Xuchang 461000, China
  • Received:2009-10-12 Revised:1900-01-01 Online:2010-05-10 Published:2010-05-10

Abstract: The network management protocol SNMP has its flaws, but it has not solved by itself. So other secure protocol must be employed to deal with the flaws of SNMP. It is a good method that the secure shell protocol(SSH) can resolve the flaws of SNMP. In this paper the secure shell security model is constructed based on the SSH and its performance is analyzed, which is good to the network security management.

Key words: SNMP, SSHSM, SSH, security, performance

CLC Number: