Skip to main content

Experimental Study and Analysis of Security Threats in Compromised Networks

  • Conference paper
  • First Online:
Emerging Trends in Computing and Communication

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 298))

Abstract

Intrusion Detection Systems (IDSs) are an indispensable part of a network infrastructure where inordinate attacks such as Distributed Denial-of-Service (DDoS) and metasploits have posed a major problem to the public and private computer networks. IDS assist the network administrators to monitor activities like gaining unauthorized access, session hijacking etc. These unlawful activities can result in losses to an enterprise, both in terms of money and resources. In this paper we detect and prevent one of the commonly occurring server attacks and follow it up with a fatal attack that can fully immobilize and destroy a server. We study and analyze the responses of the intrusion detection server when the network is exploited and the security of the network is compromised. Several dissimilar exploits are made on various Linux distributions hence, assisting the network administrators relying on the IDS to take appropriate action.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cuppens F (2001) Managing alerts in a multi-intrusion detection environment. In: Proceedings of ACSAC

    Google Scholar 

  2. Kleinwaechter J (1998) The limitations of intrusion detection on high speed networks. In: First international workshop on the recent advances in intrusion detection (RAID’98), Louvain-La-Neuve, Belgium

    Google Scholar 

  3. Marinova Boncheva V (2007) A short survey of intrusion detection systems. Institute of Information Technologies, 1113 Sofia, pp 23–30

    Google Scholar 

  4. Fung C (2011) Collaborative intrusion detection networks and insider attacks. J Wirel Mob Netw Ubiquit Comput Dependable Appl 2(1):63–74

    Google Scholar 

  5. Koch R (2011) Towards next-generation intrusion detection. Institut für Technische Informatik (ITI), Universität der Bundeswehr, Munich

    Google Scholar 

  6. Singaraju S, Parsi K (2012) A precise survey on intrusion detection systems. Int J Adav Res Comput Sci Softw Eng 2(9):243–247

    Google Scholar 

  7. Xinzhou Q, Lee W (2003) Statistical causality analysis of infosec alert data. In: Proceedings of the 6th international symposium on recent advances in intrusion detection (RAID 2003), pp 73–93

    Google Scholar 

  8. Yasinsac A, Goregaoker S (2002) An intrusion detection system for security protocol traffic. Technical report, Department of computer science, Florida State University, Tallahassee, Florida 32306-4530

    Google Scholar 

  9. Koch R (2012) Fast network-based brute-force detection. In: 8th advanced international conference on telecommunications (AICT)

    Google Scholar 

  10. Zhang Y, Lee W, Huang Y (2003) Intrusion detection techniques for mobile wireless networks. ACM Wirel Netw J 9(5):545–556

    Article  Google Scholar 

  11. Todd AD, Raines RA, Baldwin RO, Mullins BE, Rogers SK (2007) Alert verification evasion through server response forging. In: Proceedings of the 10th international conference on recent advances in intrusion detection (RAID’07), pp 256–275

    Google Scholar 

  12. Banerjee U, Swaminathan A (2011) A taxonomy of attacks and attackers in MANETs. Int J Res Rev Comput Sci 2:437–441 (Academy Publishers)

    Google Scholar 

  13. BackTrack Linux (2011) http://www.backtracklinux.org/

  14. Metsaploit framework, http://en.wikipedia.org/wiki/Metasploit_Project

  15. Wireshark available at http://www.wireshark.org/

  16. Vulnerability assessment, http://en.wikipedia.org/wiki/Vulnerability_assessment

  17. Nessus available at http://www.nessus.swri.org/

  18. Ruby—an open source programming language, http://www.ruby-lang.org/en/

Download references

Acknowledgments

The Usha Banerjee wishes to acknowledge the support of a WOS-A project (ref. no. : SR/WOS-A/ET-20/2008) funded by the Department of Science and Technology, Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Usha Banerjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Banerjee, U., Arya, K.V. (2014). Experimental Study and Analysis of Security Threats in Compromised Networks. In: Sengupta, S., Das, K., Khan, G. (eds) Emerging Trends in Computing and Communication. Lecture Notes in Electrical Engineering, vol 298. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1817-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1817-3_6

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1816-6

  • Online ISBN: 978-81-322-1817-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics