Abstract
Intrusion Detection Systems (IDSs) are an indispensable part of a network infrastructure where inordinate attacks such as Distributed Denial-of-Service (DDoS) and metasploits have posed a major problem to the public and private computer networks. IDS assist the network administrators to monitor activities like gaining unauthorized access, session hijacking etc. These unlawful activities can result in losses to an enterprise, both in terms of money and resources. In this paper we detect and prevent one of the commonly occurring server attacks and follow it up with a fatal attack that can fully immobilize and destroy a server. We study and analyze the responses of the intrusion detection server when the network is exploited and the security of the network is compromised. Several dissimilar exploits are made on various Linux distributions hence, assisting the network administrators relying on the IDS to take appropriate action.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cuppens F (2001) Managing alerts in a multi-intrusion detection environment. In: Proceedings of ACSAC
Kleinwaechter J (1998) The limitations of intrusion detection on high speed networks. In: First international workshop on the recent advances in intrusion detection (RAID’98), Louvain-La-Neuve, Belgium
Marinova Boncheva V (2007) A short survey of intrusion detection systems. Institute of Information Technologies, 1113 Sofia, pp 23–30
Fung C (2011) Collaborative intrusion detection networks and insider attacks. J Wirel Mob Netw Ubiquit Comput Dependable Appl 2(1):63–74
Koch R (2011) Towards next-generation intrusion detection. Institut für Technische Informatik (ITI), Universität der Bundeswehr, Munich
Singaraju S, Parsi K (2012) A precise survey on intrusion detection systems. Int J Adav Res Comput Sci Softw Eng 2(9):243–247
Xinzhou Q, Lee W (2003) Statistical causality analysis of infosec alert data. In: Proceedings of the 6th international symposium on recent advances in intrusion detection (RAID 2003), pp 73–93
Yasinsac A, Goregaoker S (2002) An intrusion detection system for security protocol traffic. Technical report, Department of computer science, Florida State University, Tallahassee, Florida 32306-4530
Koch R (2012) Fast network-based brute-force detection. In: 8th advanced international conference on telecommunications (AICT)
Zhang Y, Lee W, Huang Y (2003) Intrusion detection techniques for mobile wireless networks. ACM Wirel Netw J 9(5):545–556
Todd AD, Raines RA, Baldwin RO, Mullins BE, Rogers SK (2007) Alert verification evasion through server response forging. In: Proceedings of the 10th international conference on recent advances in intrusion detection (RAID’07), pp 256–275
Banerjee U, Swaminathan A (2011) A taxonomy of attacks and attackers in MANETs. Int J Res Rev Comput Sci 2:437–441 (Academy Publishers)
BackTrack Linux (2011) http://www.backtracklinux.org/
Metsaploit framework, http://en.wikipedia.org/wiki/Metasploit_Project
Wireshark available at http://www.wireshark.org/
Vulnerability assessment, http://en.wikipedia.org/wiki/Vulnerability_assessment
Nessus available at http://www.nessus.swri.org/
Ruby—an open source programming language, http://www.ruby-lang.org/en/
Acknowledgments
The Usha Banerjee wishes to acknowledge the support of a WOS-A project (ref. no. : SR/WOS-A/ET-20/2008) funded by the Department of Science and Technology, Government of India.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Banerjee, U., Arya, K.V. (2014). Experimental Study and Analysis of Security Threats in Compromised Networks. In: Sengupta, S., Das, K., Khan, G. (eds) Emerging Trends in Computing and Communication. Lecture Notes in Electrical Engineering, vol 298. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1817-3_6
Download citation
DOI: https://doi.org/10.1007/978-81-322-1817-3_6
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1816-6
Online ISBN: 978-81-322-1817-3
eBook Packages: EngineeringEngineering (R0)