z-logo
open-access-imgOpen Access
Implementation of Intrusion Detection System and Traffic Analysis – A Case of a Linux Platform
Author(s) -
Isaac Bansah,
Tonny Montana,
Stephen Brako
Publication year - 2016
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2016909709
Subject(s) - computer science , intrusion detection system , operating system , intrusion , computer security , geochemistry , geology
The security of a Computer network cannot be compromised in any form as it would actually defeat the exact purpose for which the network exists; to provide connectivity between nodes that would allow exchange of information or resources. It also goes a long way to ensure absolute security for nodes in communication, information at source, in transit or flight and finally at the destination. Security implementations may vary according to network designs but it is essentially suppose to provide Authentication, Data integrity, Confidentiality, Access control and Availability. This paper looks at the implementation of an Intrusion Detection System on a Linux operating systems and analyzing the traffic, threats and vulnerabilities with a configured Firewall General terms Access privileges, Packets, Operating System

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom