International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 141 - Number 7 |
Year of Publication: 2016 |
Authors: Isaac Bansah, Tonny Montana Adegboyega, Stephen Brako Oti |
10.5120/ijca2016909709 |
Isaac Bansah, Tonny Montana Adegboyega, Stephen Brako Oti . Implementation of Intrusion Detection System and Traffic Analysis – A Case of a Linux Platform. International Journal of Computer Applications. 141, 7 ( May 2016), 21-29. DOI=10.5120/ijca2016909709
The security of a Computer network cannot be compromised in any form as it would actually defeat the exact purpose for which the network exists; to provide connectivity between nodes that would allow exchange of information or resources. It also goes a long way to ensure absolute security for nodes in communication, information at source, in transit or flight and finally at the destination. Security implementations may vary according to network designs but it is essentially suppose to provide Authentication, Data integrity, Confidentiality, Access control and Availability. This paper looks at the implementation of an Intrusion Detection System on a Linux operating systems and analyzing the traffic, threats and vulnerabilities with a configured Firewall General terms Access privileges, Packets, Operating System