Capítulo de livro Revisado por pares

Experimental Study and Analysis of Security Threats in Compromised Networks

2014; Springer Science+Business Media; Linguagem: Inglês

10.1007/978-81-322-1817-3_6

ISSN

1876-1119

Autores

Usha Banerjee, K. V. Arya,

Tópico(s)

Opportunistic and Delay-Tolerant Networks

Resumo

Intrusion Detection Systems (IDSs) are an indispensable part of a network infrastructure where inordinate attacks such as Distributed Denial-of-Service (DDoS) and metasploits have posed a major problem to the public and private computer networks. IDS assist the network administrators to monitor activities like gaining unauthorized access, session hijacking etc. These unlawful activities can result in losses to an enterprise, both in terms of money and resources. In this paper we detect and prevent one of the commonly occurring server attacks and follow it up with a fatal attack that can fully immobilize and destroy a server. We study and analyze the responses of the intrusion detection server when the network is exploited and the security of the network is compromised. Several dissimilar exploits are made on various Linux distributions hence, assisting the network administrators relying on the IDS to take appropriate action.

Referência(s)