Network Security using Linux Intrusion Detection System

Download Full Text
Author(s):
Arul Anitha
Published Date:
December 30, 2011
Issue:
Volume 2, Issue 1
Page(s):
33 - 38
DOI:
10.7815/ijorcs.21.2011.012
Views:
4249
Downloads:
470

Keywords:
intrusion, attack, security, grant, lids
Citation:
Arul Anitha, "Network Security using Linux Intrusion Detection System". International Journal of Research in Computer Science, 2 (1): pp. 33-38, December 2011. doi:10.7815/ijorcs.21.2011.012 Other Formats

Abstract

Attacks on the nation’s computer infrastructures are becoming an increasingly serious problem. Firewalls provide a certain amount of security, but can be fooled at times by attacks like IP spoofing and the so called authorized users. So an intelligent system that can detect attacks and intrusions is required. The tool GRANT (Global Real-time Analysis of Network Traffic) being a Linux based Intrusion Detection System(LIDs), takes the advantage of the security of a Linux box and secures the other nodes in the perimeter of the network. It is capable of detecting intrusions and probes as and when they occur and capable of responding to “already” successful attacks, thus causing minimal or no damage to the entire network. For better performance, this Linux Intrusion Detection System should be part of a defense in depth strategy such as Firewall and Intrusion Prevention.

  1. Rebecca Bace and Peter Mell, “Intrusion Detection System”, NIST special publication on Intrusion Detection System, 2001.
  2. Jeff Reinhard, “Network Intrusion Detection System”, PenTele Data, Palmerton
  3. Grant Users Manual, GrantRelease: 1.8.1, Hexa Bytes Pvt.Ltd.
  4. Harley Kozushko, “Intrusion Detection: Host-Based and Network Based Intrusion Detection Systems”, Independent Study- 2003.
  5. Giovanni Vigna and Christopher Kruegel, “Host Based Intrusion Detection System”, WL041/Bidgoli WL041-Bidgoli.cls June 15, 2005
  6. Vipin Das et al, “Network Intrusion Detection System Based On Machine Learning Algorithms”, International Journal of Computer Science & Information Technology (IJCSIT), Vol 2, No 6, December 2010.
  7. Rafeeq Ur Rehman, “Intrusion Detection Systems with Snort, Library of Congress Cataloging-in-Publication Data, ISBN 0-13-140733-3
  8. Tejinder Aulakh, “Intrusion Detection and Prevention System: CGI Attacks”, The Faculty of the Department of Computer Science, San Jose State University, 2009.
  9. Sebastian Elbaum and John C. Munson, “Intrusion Detection through Dynamic Software Measurement”, Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, USA, April 9–12, 1999
  10. Taylor Merry, “Linux Kernel Hardening”, SANS Institute- 2003.
  11. J.R. Winkler, ‘‘A Unix Prototype for Intrusion and Anomaly Detection in Secure Networks,’’ Proc. 13th National Computer Security Conference, pp. 115-124, Washington, D.C., Oct. 1990.
  12. H-J Park and C. Sung-Bae, "Privilege Flows Modeling for Effective Intrusion Detection based on HMM," Proceedings CDWS2 in PRICAI, August, 2002.
  13. John McHugh et al, “The Role of Intrusion Detection Systems”, IEEE Software September/October 2000.
  14. L. Deri, R. Carbone, and S. Suin, Monitoring Networks Using Ntop, Proc. of IM 2001, Seattle, May 2001.
  15. Dong Yu, Deborah Frincke, “Towards Survivable Intrusion Detection System”, Proceedings of the 37th Hawaii International Conference on System Sciences – 2004.

  • Gobel, Mario Agapito Arizald. "ANALISA DAN PENGEMBANGAN SISTEM PERINGATAN KEAMANAN JARINGAN KOMPUTER MENGGUNAKAN SMS GATEWAY DAN PAKET FILTER." Jurnal Teknik Informatika (2014): 1-7.