Abstract
Information can be leaked, changed, damaged and illegally used regardless of the intension of the information owner. Intrusion Detection Systems and Firewalls are used to protect the illegal accesses in the network. But these are the passive protection method, not the active protection method. They only react based on the predefined protection rules or only report to the administrator. In this paper, we develop the intrusion detection and protection system using Netfilter framework. The system makes the administrator’s management easy and simple. Furthermore, it offers active protection mechanism against the intrusions.
This work was supported by a grant No.R12-2003-004-02002-0 from Korea Ministry of Commerce, Industry and Energy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Schupp, S.: Limitation of Network Intrusion Detection, http://www.sans.org/rr/whitepapers/detection/
Bace, R.G.: Intrusion Detection. Macmillan Technical Pub., Basingstoke (2000)
Esmaili, M., Safavi-Naini, R., Pieprzyk, J.: Intrusion Detection: a Survey. In: Proceedings of ICCC, pp. 409–414 (1995)
Jeong, B.H., Kim, J.N., Sohn, S.W.: Current Status and Expectation of Techniques for Intrusion Protection System, http://kidbs.itfind.or.kr/WZIN/jugidong/1098/109801.htm
Shim, D.C.: A trend of Intrusion Detection System. KISDI IT FOCUS 4. Korea Information Strategy Development Institute, pp. 61–65 (2001)
Alan, J.: Netfilter and IPTables: A Structural Examination, http://www.sans.org/rr/whitepapers/firewalls/1392.php
Cho, D.I., Song, K.C., Noh, B.K.: Handbook of Analysis for Detection of Network Intrusion and Hacking. Infobook (2001)
Russell, R., Welte, H.: Linux netfilter Hacking HOWTO, http://www.netfilter.org/documentation/HOWTO/netfilter-hacking-HOWTO.html
Cohen, F.: 50 ways to Defeat Your Intrusion Detection System, http://www.mjidor.com/50dis.shtml
Andreasson, O.: iptables-tutorial, http://www.0kr.net/files/iptables-tutorial.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kil, M.W., Kim, S.K., Lee, G., Kwon, Y. (2005). A Development of Intrusion Detection and Protection System Using Netfilter Framework. In: Ślęzak, D., Yao, J., Peters, J.F., Ziarko, W., Hu, X. (eds) Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing. RSFDGrC 2005. Lecture Notes in Computer Science(), vol 3642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11548706_55
Download citation
DOI: https://doi.org/10.1007/11548706_55
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28660-8
Online ISBN: 978-3-540-31824-8
eBook Packages: Computer ScienceComputer Science (R0)