Skip to main content

A Development of Intrusion Detection and Protection System Using Netfilter Framework

  • Conference paper
Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing (RSFDGrC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3642))

  • 1533 Accesses

Abstract

Information can be leaked, changed, damaged and illegally used regardless of the intension of the information owner. Intrusion Detection Systems and Firewalls are used to protect the illegal accesses in the network. But these are the passive protection method, not the active protection method. They only react based on the predefined protection rules or only report to the administrator. In this paper, we develop the intrusion detection and protection system using Netfilter framework. The system makes the administrator’s management easy and simple. Furthermore, it offers active protection mechanism against the intrusions.

This work was supported by a grant No.R12-2003-004-02002-0 from Korea Ministry of Commerce, Industry and Energy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schupp, S.: Limitation of Network Intrusion Detection, http://www.sans.org/rr/whitepapers/detection/

  2. Bace, R.G.: Intrusion Detection. Macmillan Technical Pub., Basingstoke (2000)

    Google Scholar 

  3. Esmaili, M., Safavi-Naini, R., Pieprzyk, J.: Intrusion Detection: a Survey. In: Proceedings of ICCC, pp. 409–414 (1995)

    Google Scholar 

  4. Jeong, B.H., Kim, J.N., Sohn, S.W.: Current Status and Expectation of Techniques for Intrusion Protection System, http://kidbs.itfind.or.kr/WZIN/jugidong/1098/109801.htm

  5. Shim, D.C.: A trend of Intrusion Detection System. KISDI IT FOCUS 4. Korea Information Strategy Development Institute, pp. 61–65 (2001)

    Google Scholar 

  6. Alan, J.: Netfilter and IPTables: A Structural Examination, http://www.sans.org/rr/whitepapers/firewalls/1392.php

  7. Cho, D.I., Song, K.C., Noh, B.K.: Handbook of Analysis for Detection of Network Intrusion and Hacking. Infobook (2001)

    Google Scholar 

  8. Russell, R., Welte, H.: Linux netfilter Hacking HOWTO, http://www.netfilter.org/documentation/HOWTO/netfilter-hacking-HOWTO.html

  9. Cohen, F.: 50 ways to Defeat Your Intrusion Detection System, http://www.mjidor.com/50dis.shtml

  10. Andreasson, O.: iptables-tutorial, http://www.0kr.net/files/iptables-tutorial.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kil, M.W., Kim, S.K., Lee, G., Kwon, Y. (2005). A Development of Intrusion Detection and Protection System Using Netfilter Framework. In: Ślęzak, D., Yao, J., Peters, J.F., Ziarko, W., Hu, X. (eds) Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing. RSFDGrC 2005. Lecture Notes in Computer Science(), vol 3642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11548706_55

Download citation

  • DOI: https://doi.org/10.1007/11548706_55

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28660-8

  • Online ISBN: 978-3-540-31824-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics