CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Implementation of Intrusion Detection System and Traffic Analysis – A Case of a Linux Platform

by Isaac Bansah, Tonny Montana Adegboyega, Stephen Brako Oti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 141 - Number 7
Year of Publication: 2016
Authors: Isaac Bansah, Tonny Montana Adegboyega, Stephen Brako Oti
10.5120/ijca2016909709

Isaac Bansah, Tonny Montana Adegboyega, Stephen Brako Oti . Implementation of Intrusion Detection System and Traffic Analysis – A Case of a Linux Platform. International Journal of Computer Applications. 141, 7 ( May 2016), 21-29. DOI=10.5120/ijca2016909709

@article{ 10.5120/ijca2016909709,
author = { Isaac Bansah, Tonny Montana Adegboyega, Stephen Brako Oti },
title = { Implementation of Intrusion Detection System and Traffic Analysis – A Case of a Linux Platform },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 141 },
number = { 7 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 21-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume141/number7/24798-2016909709/ },
doi = { 10.5120/ijca2016909709 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:42:51.372119+05:30
%A Isaac Bansah
%A Tonny Montana Adegboyega
%A Stephen Brako Oti
%T Implementation of Intrusion Detection System and Traffic Analysis – A Case of a Linux Platform
%J International Journal of Computer Applications
%@ 0975-8887
%V 141
%N 7
%P 21-29
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The security of a Computer network cannot be compromised in any form as it would actually defeat the exact purpose for which the network exists; to provide connectivity between nodes that would allow exchange of information or resources. It also goes a long way to ensure absolute security for nodes in communication, information at source, in transit or flight and finally at the destination. Security implementations may vary according to network designs but it is essentially suppose to provide Authentication, Data integrity, Confidentiality, Access control and Availability. This paper looks at the implementation of an Intrusion Detection System on a Linux operating systems and analyzing the traffic, threats and vulnerabilities with a configured Firewall General terms Access privileges, Packets, Operating System

References
  1. Ptacek, T. H. & Newsham, T. N. (1998). Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection [Online] Retrieved February 16, 2005 fromhttp://www.snort.org/docs/idspaper/
  2. Kumar, S., (1995), Classification and Detection of Computer Intrusions. (Thesis).
  3. Lunt, T. (1993). Detecting Intruders in Computer Systems [Online] Retrieved 25th March, 2005 from http://www.raptor.com/lib/canada93.ps
  4. Roesch, M. (1999) Snort-Lightweight Intrusion Detection for Networks, Proceedings of LISA ’99: 13th Systems Administration Conference [Online] Retrieved 10th April, 2005 fromhttp://www.usenix.org/publications/library/proceedings/lisa99/full_papers/roesch/roesch.pdf
  5. Northcutt, S. and Novak, J., (2003), Network Intrusion Detection: An Analyst’s Handbook, Third Edition. New Riders.
  6. Northcutt, S. (2005) What is network intrusion detection? [Online] Retrieved 28th March, 2005 from http://www.sans.org/resources/idfaq/network_based.php
  7. Allen, J. & Christie, A. (2000). “State of the practice of intrusion detection technologies” [Online] Retrieved February 20, 2005 from http://www.cert.org/archive/pdf/99tr028.pdf
  8. Axelsson, S. "Intrusion detection systems: A survey and taxonomy," Technical Report 99-15, Department of Computer Engineering, Chalmers University, March 2000.
  9. Burgess, M. (2004). Principles of Networking and System administration, (2nd Ed.). Chichester, John Wiley and Sons, Ltd.
  10. Forrest, S., Hofmeyr, S. A., Somayaji, A. & Longstaff, T.A. (1996). “A Sense of Self for Unix Processes” Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy [Online] Retrieved February 24, 2005 fromhttp://citeseer.ist.psu.edu/forrest96sense.html
  11. Choi, M., (2008), Wireless Network Security. International Journal of Multimedia and Ubiquitous Engineering (Vol. 3, No. 3). School of Multimedia, Hannam University, Daejeon, Korea.
  12. Nestler, V. J., et al., (2006), Computer Security Lab Manual. McGraw-Hill/Irwin, New York, USA.
  13. Early, G (2004). Transmission Control Protocol (TCP), Lecture 04, University of Portsmouth.
  14. Kurose, J.F. & Ross, K.W. Computer Networking: A Top- Down Approach Featuring the Internet, (2nd Ed.). Pearson Education, Inc.
  15. Northcut, S. & Novak, J. (2002). Network Intrusion Detection, (3rd Ed.). New Riders Publishing.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System Linux Traffic Analysis Network Security