![]() |
10.5120/ijca2016909709 |
Tonny Montana Adegboyega Isaac Bansah and Stephen Brako Oti. Implementation of Intrusion Detection System and Traffic Analysis – A Case of a Linux Platform. International Journal of Computer Applications 141(7):21-29, May 2016. BibTeX
@article{10.5120/ijca2016909709, author = {Isaac Bansah, Tonny Montana Adegboyega and Stephen Brako Oti}, title = {Implementation of Intrusion Detection System and Traffic Analysis – A Case of a Linux Platform}, journal = {International Journal of Computer Applications}, issue_date = {May 2016}, volume = {141}, number = {7}, month = {May}, year = {2016}, issn = {0975-8887}, pages = {21-29}, numpages = {9}, url = {http://www.ijcaonline.org/archives/volume141/number7/24798-2016909709}, doi = {10.5120/ijca2016909709}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
The security of a Computer network cannot be compromised in any form as it would actually defeat the exact purpose for which the network exists; to provide connectivity between nodes that would allow exchange of information or resources. It also goes a long way to ensure absolute security for nodes in communication, information at source, in transit or flight and finally at the destination. Security implementations may vary according to network designs but it is essentially suppose to provide Authentication, Data integrity, Confidentiality, Access control and Availability. This paper looks at the implementation of an Intrusion Detection System on a Linux operating systems and analyzing the traffic, threats and vulnerabilities with a configured Firewall
General terms
Access privileges, Packets, Operating System
References
- Ptacek, T. H. & Newsham, T. N. (1998). Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection [Online] Retrieved February 16, 2005 fromhttp://www.snort.org/docs/idspaper/
- Kumar, S., (1995), Classification and Detection of Computer Intrusions. (Thesis).
- Lunt, T. (1993). Detecting Intruders in Computer Systems [Online] Retrieved 25th March, 2005 from http://www.raptor.com/lib/canada93.ps
- Roesch, M. (1999) Snort-Lightweight Intrusion Detection for Networks, Proceedings of LISA ’99: 13th Systems Administration Conference [Online] Retrieved 10th April, 2005 fromhttp://www.usenix.org/publications/library/proceedings/lisa99/full_papers/roesch/roesch.pdf
- Northcutt, S. and Novak, J., (2003), Network Intrusion Detection: An Analyst’s Handbook, Third Edition. New Riders.
- Northcutt, S. (2005) What is network intrusion detection? [Online] Retrieved 28th March, 2005 from http://www.sans.org/resources/idfaq/network_based.php
- Allen, J. & Christie, A. (2000). “State of the practice of intrusion detection technologies” [Online] Retrieved February 20, 2005 from http://www.cert.org/archive/pdf/99tr028.pdf
- Axelsson, S. "Intrusion detection systems: A survey and taxonomy," Technical Report 99-15, Department of Computer Engineering, Chalmers University, March 2000.
- Burgess, M. (2004). Principles of Networking and System administration, (2nd Ed.). Chichester, John Wiley and Sons, Ltd.
- Forrest, S., Hofmeyr, S. A., Somayaji, A. & Longstaff, T.A. (1996). “A Sense of Self for Unix Processes” Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy [Online] Retrieved February 24, 2005 fromhttp://citeseer.ist.psu.edu/forrest96sense.html
- Choi, M., (2008), Wireless Network Security. International Journal of Multimedia and Ubiquitous Engineering (Vol. 3, No. 3). School of Multimedia, Hannam University, Daejeon, Korea.
- Nestler, V. J., et al., (2006), Computer Security Lab Manual. McGraw-Hill/Irwin, New York, USA.
- Early, G (2004). Transmission Control Protocol (TCP), Lecture 04, University of Portsmouth.
- Kurose, J.F. & Ross, K.W. Computer Networking: A Top- Down Approach Featuring the Internet, (2nd Ed.). Pearson Education, Inc.
- Northcut, S. & Novak, J. (2002). Network Intrusion Detection, (3rd Ed.). New Riders Publishing.
Keywords
Intrusion Detection System, Linux, Traffic Analysis, Network Security