Experimental Study and Analysis of Security Threats in Compromised Networks
2014; Springer Science+Business Media; Linguagem: Inglês
10.1007/978-81-322-1817-3_6
ISSN1876-1119
Autores Tópico(s)Opportunistic and Delay-Tolerant Networks
ResumoIntrusion Detection Systems (IDSs) are an indispensable part of a network infrastructure where inordinate attacks such as Distributed Denial-of-Service (DDoS) and metasploits have posed a major problem to the public and private computer networks. IDS assist the network administrators to monitor activities like gaining unauthorized access, session hijacking etc. These unlawful activities can result in losses to an enterprise, both in terms of money and resources. In this paper we detect and prevent one of the commonly occurring server attacks and follow it up with a fatal attack that can fully immobilize and destroy a server. We study and analyze the responses of the intrusion detection server when the network is exploited and the security of the network is compromised. Several dissimilar exploits are made on various Linux distributions hence, assisting the network administrators relying on the IDS to take appropriate action.
Referência(s)