Monitor Linux Security Using Scripts



Similar documents
A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM

Survey on Linux Security and Vulnerabilities

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

How To Classify A Dnet Attack

A Roadmap for Securing IIS 5.0

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) /24

Firewalls Netasq. Security Management by NETASQ

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

A Decision Maker s Guide to Securing an IT Infrastructure

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Linux Network Security

Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett

PasserellesNumeriquesCambodia (PNC)

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

How to protect your home/office network?

Bastille Linux: Security Through Transparency

Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide

Network Security and Firewall 1

There are numerous ways to access monitors:

A Study on the Security aspects of Network System Using Penetration Testing

Net Protector Admin Console

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

Kaseya 2. User Guide. for Network Monitor 4.1

Patch and Vulnerability Management Program

Network Security Administrator

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Configuring SNMP Cisco and/or its affiliates. All rights reserved. 1

Basics of Internet Security

Running a Default Vulnerability Scan SAINTcorporation.com

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Firewalls and Software Updates

Workflow Templates Library

Denial of Service Attacks

Lab 1: Network Devices and Technologies - Capturing Network Traffic

Laboration 3 - Administration

Security Best Practice

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

CMPT 471 Networking II

Strategies to Protect Against Distributed Denial of Service (DD

Ethical Hacking Course Layout

Installing and Configuring Nessus by Nitesh Dhanjani

Penetration Testing Report Client: Business Solutions June 15 th 2015

Configuring Security for FTP Traffic

Virtualization System Security

Project 2: Firewall Design (Phase I)

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Client Server Registration Protocol

Bitrix Site Manager ASP.NET. Installation Guide

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

FISMA / NIST REVISION 3 COMPLIANCE

TRIPWIRE NERC SOLUTION SUITE

Footprinting and Reconnaissance Tools

Network Security Guidelines. e-governance

Secret Server Qualys Integration Guide

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

IDS / IPS. James E. Thiel S.W.A.T.

Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks

SCP - Strategic Infrastructure Security

FileMaker Server 15. Getting Started Guide

AT-S45 Version Management Software for the AT-9410GB Gigabit Ethernet Switches. Software Release Notes

NETWORK SECURITY WITH OPENSOURCE FIREWALL

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Applied Security Lab 2: Personal Firewall

FortiWeb 5.0, Web Application Firewall Course #251

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE

17 April Remote Scan

Proactively Managing Servers with Dell KACE and Open Manage Essentials

Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu (Amd66) On Ubuntu 4.5 On A Windows Box

Network Security Using Hybrid Port Knocking

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

A Review on Network Intrusion Detection System Using Open Source Snort

Lab Objectives & Turn In

That Point of Sale is a PoS

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Guideline for setting up a functional VPN

Looking for Trouble: ICMP and IP Statistics to Watch

IDS and Penetration Testing Lab ISA656 (Attacker)

Transcription:

International Journal of Emerging Engineering Research and Technology Volume 3, Issue 6, June 2015, PP 176-181 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Monitor Linux Security Using Scripts Ashvini T. Deshmukh, Parikshit. N. Mahalle Department of computer Engg, Smt. Kashibai Navale College of Engg, Pune, India ABSTRACT This paper will show how to use basic linux scripting to create a reusable linux security monitor such as work station, network and server security monitor that is simple to use and simple to maintain. Linux commands are discussed along with techniques to automate them and interpret their results. This paper gives enough information for security professionals to start creating their own generic reusable linux script within their own collection of personal tool. Keywords: Linux Scripting, Automating Linux command, Security aspects. INTRODUCTION Purpose Many security professionals find themselves in a position where they do not have a complete set of commercial security tools. This happens often because of tools are lacking, in a low budget situation where purchasing tool is not possible or in limited environment where commercial products cannot be implemented. Even in limited situations, it is unacceptable to try to implement security without proper tools. There should be each security requirement must be addressed in some way even where extensive commercial tools are not available. Where extensive tools are not available simpler tools of some sort must be implemented to enable basic security. Proposed Works To achieve our purpose linux scripting can help. Linux has many more powerful commands which are used for checking various security aspects. These commands can be harnessed and automated into a generic reusable tool that will provide desired results. So commands such as ping, netstat, nmap are automated. Using script workstation vulnerability report, disk utilization report, FTP server vulnerability report, network status report generated and it is in simplified form because of that simplification user who is not much aware about linux security is easily understand report and give attention towards linux security. Also alert messages are generated by seeing this alert messages user easily understand what are the vulnerability and what should be the resolution. Using script log analysis report is generated by seeing this report user will always keep watching what is going on inside the network If server may crash he will easily figure out the reason that is what happened prior to crash. Also using script network security monitored. Linux scripting provide basic functionality, consistency, ease of use, ease of maintenance. RELATED WORKS In [3] we address vulnerabilities in different areas such as workstation, network and server security. In this paper given vulnerabilities and its countermeasures. *Address for correspondence: ashu13.cse@gmail.com International Journal of Emerging Engineering Research and Technology V3 I6 June 2015 176

In[4] we propose a new system implementation in order to harden the linux. Following is proposed system implementation. Figure2.1. System Implementation[4]. The Linux Hardening model consists of three modules which makes the Linux more secure from the attackers which are: 1. Vulnerability check module 2. Log Analysis Module 3. Security Module Vulnerability Check Module This module will check such configuration files and scan for attribute which are important from security perspective. This module check current attribute value with best security value required for that attribute. If current configured value is not a best security value then it will consider it as vulnerability and generates the vulnerability report. Generated report is given to the security module. Log Analysis Module Linux system consists of very strong logging mechanism maintains the log for kernel, servers, users, system processes etc. These entire logs by default placed at different location. This module collects the log from these various places and generates report. This generated report is useful for finding the vulnerability. Generated report is given to the security module. Security Module This module collects the vulnerability report and log analysis report and applies security. By looking vulnerability report this module get the vulnerable configuration files and modify them with best security practice. Similarly by looking log analysis report this module apply the security attributes accordingly. This model is actually responsible for modifying the configuration files and making the Linux more secure. RESULTS AND DISCUSSION Linux Commands The ping command will show whether a machine is available on network or not. It can also show timing delays and whether packets are being lost on the network. 177 International Journal of Emerging Engineering Research and Technology V3 I6 June 2015

The netstat command will show that what connections are currently active between the local machine and other network machine. On a server this would show who is connected to the server or communicating with it. Automating Linux Command Basic script can be created to automate these commands. This allows a single script to perform frequent test. Script can contain hard coded command so that command syntax does not have to be remember and so helpful options are not forgotten. Result Interpretation We have tested commands in network having three nodes. Machines having localhost (127.0.0.1), 192.168.10.10,192.168.10.12. Ip addresses are These commands are tested by interactively typing the ping command with count of three and results are tested. On Existing System: On linux prompt type following command but this command will have to type for three times. # ping c3 localhost But you should have repeat this procedure to check another machine in network. This shows that 192.168.10.10 machine is up on the network. It shows that is not losing packets and also round-trip time is good. However it would be time consuming to frequently ping every machine and observe the results and results are also not in simplified form. On Proposed System: Consider the script called network status report. This script will execute the three ping commands for when the command name of the script is typed at the Linux prompt. It will shows following report. So script will perform ping command, test the results and gives final conclusion in simplified form also generate the alert message so that administrator understand network status. The command do not have executed separately. International Journal of Emerging Engineering Research and Technology V3 I6 June 2015 178

Discussion Ashvini T. Deshmukh & Parikshit. N. Mahalle Monitor Linux Security Using Scripts We have taken ping command as an example for result interpretation. We have developed many more scripts for different security aspects. Following are the scripts 1) vulnerability report in that script four type of report generated which are workstation vulnerability report, Disk utilization report, FTP server vulnerability report, Network vulnerability report. 2) Script for user security, in that script we provide different options for user management such as manage users without password. We can delete user or add password to user who doesn t have password. Another functionality is apply age policy and single user mode password. 3) Script for package management, in that script three options are there. We can list out installed packages, verify installed package, install packages. 4) Script for network security, this script is very worth because it checks network related security aspects. Following are the options over there -close open ports, remote live monitoring, remote port scan, remote live monitoring, login banner, block packet forwarding, block reply to ICMP broadcast, enable protection against bad ICMP messages, enable SYN flood protection, block source routed packets. 5) Script for log monitoring, in that script we collect log from different log files and separate it according classification and generate respective reports such as summary report, failed summary report, authentication report, login report, login from remote host report, account modification report, anomaly report. Also performs live log monitoring within network. GRAPHS Time Required For Report generation Following graph shows time required for checking different vulnerability and report generation in existing Vs proposed system. Figure4.1. Time required for report generation Graph shows time to check workstation vulnerability in existing system is 3 minute but for proposed system it is 1 minute. In similar way time to check disk utilization and FTP server vulnerability in existing system is more than proposed system. Also for network vulnerability time to check vulnerability is very high in existing system than proposed system Time Required For Log Analysis and Network Security Following graph shows time required for log analysis and network security in existing system and proposed system. 179 International Journal of Emerging Engineering Research and Technology V3 I6 June 2015

Figure2.2. Time required for log analysis and network security In existing system time required for log analysis is 15 minute but it is 4 to 5 minute in proposed system including live log monitoring. And for network security such as list out open ports, close unrequired open ports, kill unnecessary processes, login banners takes more time in existing system than proposed system. COMPARISION PARAMETERS System Characteristics Table5.1. Existing Vs Proposed system characteristics Characteristics Existing System Proposed System Operating system General purpose Security purpose Acceptable processing time Long time Less time Handling complexity Hard to handle Easy to handle Security Practices Table5.2. Security practices in existing Vs proposed system Practice Existing system Proposed system Security awareness Usually low High Working with security parameter Difficult Easy Need of security expertise Yes No 5.3. Impact Of Negative Event Table46.3. Negative impact of event in existing Vs proposed system Event Existing System Proposed System Losses Information, data more chances Less chances of loss Cost of successful attack More Less CONCLUSIONS AND FUTURE SCOPE Linux is open source operating system so security professionals should have to take advantage of it and tune and customize the kernel to their specific needs and hardware. So harden the linux according to requirement. Because of the characteristics and more power full command it becomes popular. Linux is secure but when its security parameters are set to standard security values and for that security awareness is very important. This paper gives security awareness so that user who is new to linux also easily understands security aspects. This is achieving through scripting. Basic Linux scripting can be used to develop tools in less amount of time and easily with little cost. It is important to always remember your scripts should be reusable and generic. Otherwise, they will have to be rebuilt from scratch every time. The more maintainable a script is, the more likely it is to be adapted to changing requirements and ported to new environments REFERENCES [1] Andrea Barisani, Thomas Bader, Hacking Linux Exposed Linux security and secerets, Edition 3,2008. [2] Manuel Cheminod,Luca Durante,Adriano Valenzano, Review of security issues in industrial networks,ieee transaction onindustrialinformatics,vol.9,no.1,feb2013. International Journal of Emerging Engineering Research and Technology V3 I6 June 2015 180

[3] Ashvini T. Dheshmukh, Parikshit. N. Mahalle.Survey on linux security and vulnerabilities IJECS Publisher,v-3 issue 9 sept-2014,page no 8265-8269. [4] Ashvini T Deshmukh and Parikshit. N Mahalle. Enhancing Security in Linux OS. International Journal of Computer Applications 117(12):34-37, May 2015. [5] Red Hat Engineering Content Services, Red Hat Enterprise Linux 6 Security Guide A Guide to Securing Red Hat Enterprise Linux, Edition 3, 2011. [6] Udi Ben-Porat,Anat Bremler-Barr, Vulnerability of network mechanisms to sophisticated DDoS attacks, IEEE transaction on computers Vol.62,No.5,May 2013. [7] Nigel Edwards, Joubert Berger, and Tse Houng Choo. A Secure Linux Platform. In Proceedings of the 5th Annual Linux Showcase and Conference, November 2001 [8] Stefan Lindskog and Erland Jonsson, Different Aspects of Security Problems in Network Operating System, [9] Hannes Holm,Mathias Eksted, Empirical Analysis Of System-Level Vulnerabilities Metrices through Actual Attacks, IEEE transaction on dependable and secure computing, vol 9,no 6,Nov/Dec 2012. [10] James Turnbull, hardening Linux, 2005. [11] P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell, The Inevitabil-ity of Failure:The Flawed Assumption of Security in Modern Computing Environments, In 21st National Information Systems Security Conference, pages 303 314. NSA, 1998. [12] Jaromír Hradílek Red Hat, Inc. Engineering Content Services, Red Hat Enterprise Linux 6 Deployment Guide Deployment, Configuration and Administration of Red Hat Enterprise Linux, Edition 3, 2012. AUTHORS BIOGRAPHY Ashvini Tanaji Deshmukh has obtained BE degree in Computer Science and Engineering from Shivaji University, Kolhapur, India and pursing M.E. degree in Computer Networks from Savitribai Phule Pune University, Pune, India. Prof. Parikshit N. Mahalle has obtained his B.E degree in Computer Science and Engineering from Sant Gadge Baba Amravati University, Amravati, India and M.E. degree in Computer Engineering from Savitribai Phule Pune University, Pune, India. He completed his Ph. D in Computer Science and Engineering specialization in Wireless Communication from Aalborg University, Aalborg, Denmark. He has more than 14 years of teaching and research experience. He is a member board of studies in computer engineering, Savitribai Phule Pune University, Pune, India. He is IEEE member, ACM member, Life member CSI and Life member ISTE. He is paper reviewer for Springer journal of Wireless Personal Communications and Elsevier journal of Applied Computing and Informatics. He has also remained technical program committee member for International conferences and symposium like ICC 2014, ICACCI 2013, IEEE ICC 2015 SAC-Communication for Smart Grid, IEEE ICC 2015 SAC-Social Networking, IEEE ICC 2014 Selected Areas in Communication Symposium, IEEE INDICON 2014, CSI ACC 2014, IEEE GCWSN 2014. He has published 42 research publications at national and international journals and conferences. He has authored 5 books on subjects like Data Structures, Theory of Computations and Programming Languages. He is also the recipient of Best Faculty Award by STES and Cognizant Technologies Solutions. He has also delivered invited talk on Identity Management in IoT to Symantec Research Lab, Mountain View, California. From 2000 to 2005, he worked as Assistant Professor in Vishwakarma Institute of technology, Pune, India. Currently he is working as Professor and Head in Department of Computer Engineering at STES s Smt. Kashibai Navale College of Engineering, Pune, India. He has guided more than 100 plus undergraduate students and 10 plus post-graduate students for projects. His recent research interests include Algorithms, Internet of Things, Identity Management and Security. 181 International Journal of Emerging Engineering Research and Technology V3 I6 June 2015