Penetration Testing and Network Auditing: Linux


Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdullah, Journal of Information Processing Systems Vol. 11, No. 1, pp. 104-115, Mar. 2015  

10.3745/JIPS.03.0013
Keywords: Network attack, network auditing, network forensic
Fulltext:

Abstract

Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive, and accessible to the public. In this work, network penetration testing and auditing of the Redhat operating system (OS) are highlighted as one of the most popular OS for Internet applications. Some types of attacks are from a different side and new attack method have been attempted, such as: scanning for reconnaissance, guessing the password, gaining privileged access, and flooding the victim machine to decrease availability. Some analyses in network auditing and forensic from victim server are also presented in this paper. Our proposed system aims confirmed as hackable or not and we expect for it to be used as a reference for practitioners to protect their systems from cyber-attacks.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Stiawan, D., Idris, M., & Abdullah, A. (2015). Penetration Testing and Network Auditing: Linux. Journal of Information Processing Systems, 11(1), 104-115. DOI: 10.3745/JIPS.03.0013.

[IEEE Style]
D. Stiawan, M. Y. Idris, A. H. Abdullah, "Penetration Testing and Network Auditing: Linux," Journal of Information Processing Systems, vol. 11, no. 1, pp. 104-115, 2015. DOI: 10.3745/JIPS.03.0013.

[ACM Style]
Deris Stiawan, Mohd. Yazid Idris, and Abdul Hanan Abdullah. 2015. Penetration Testing and Network Auditing: Linux. Journal of Information Processing Systems, 11, 1, (2015), 104-115. DOI: 10.3745/JIPS.03.0013.