skip to main content
10.1145/3510362.3510363acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsccConference Proceedingsconference-collections
research-article

Bugs in Security Onion

Authors Info & Claims
Published:17 March 2022Publication History

ABSTRACT

Once the development of information technology and network, the problem of information security is becoming increasingly prominent. The scope and content of network security threats continue to expand and evolve, and the network security situation and challenges are becoming increasingly severe and complex. It is becoming more and more important to perceive the network security situation, monitor the network operation status, and ensure the security of information assets.

Security Onion (SO) is a free and opensource Linux distribution for threat hunting, enterprise security monitoring, and log management. Security Onion is used to monitor specific network traffic, detect intrusion actions, and stop the attacker from taking further actions. Bugs in other Linux versions of operating systems may also exist in SO.

This paper presents some existing security bugs in Ubuntu and the Linux kernel and tests whether these exist and lead to security vulnerabilities that can be exploited in Security Onion as well. Kali Linux with Nmap and Metasploit-Framework is used to implement exploits.

References

  1. S. Bokhari, The Linux operating system, Computer, vol. 28, no. 8, pp. 74-79, 1995.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Silberschatz, J. L. Peterson, and P. B. Galvin, Operating system concepts. Addison-Wesley Longman Publishing Co., Inc., 1991.Google ScholarGoogle Scholar
  3. R. I. Pereira, I. M. Dupont, P. C. Carvalho, and S. C. Juca, IoT embedded linux system based on Raspberry Pi applied to real-time cloud monitoring of a decentralized photovoltaic plant, Measurement, vol. 114, pp. 286-297, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  4. J. Corbet, A. Rubini, and G. Kroah-Hartman, Linux device drivers. O'Reilly Media, Inc., 2005.Google ScholarGoogle Scholar
  5. R. Heenan and N. Moradpoor, Introduction to Security Onion, in The First Post Graduate Cyber Security Symposium, 2016.Google ScholarGoogle Scholar
  6. K. Ilgun, USTAT: A real-time intrusion detection system for UNIX, in Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993: IEEE, pp. 16-28.Google ScholarGoogle Scholar
  7. S. Kesh, S. Ramanujan, and S. Nerur, A framework for analyzing e-commerce security, Information Management & Computer Security, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  8. P. Loscocco and S Smalley, Integrating Flexible Support for Security Policies into the Linux Operating System, in USENIX Annual Technical Conference, FREENIX Track, 2001, pp. 29-42.Google ScholarGoogle Scholar
  9. F. Valeur, G. Vigna, C. Kruegel, and R. A. Kemmerer, Comprehensive approach to intrusion detection alert correlation, IEEE Transactions on dependable and secure computing, vol. 1, no. 3, pp. 146-169, 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Harini and C. Fancy, A Study on the Prevention Mechanisms for Kernel Attacks, in Artificial Intelligence Techniques for Advanced Computing Applications: Springer, 2021, pp. 11-17.Google ScholarGoogle ScholarCross RefCross Ref
  11. K. B. Ferreira, K. Pedretti, R. Brightwell, P. G. Bridges, D. Fiala, and F. Mueller, Evaluating operating system vulnerability to memory errors, in Proceedings of the 2nd International Workshop on Runtime and Operating Systems for Supercomputers, 2012, pp. 1-8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. O. H. Alhazmi and Y. K. Malaiya, Application of vulnerability discovery models to major operating systems, IEEE Transactions on Reliability, vol. 57, no. 1, pp. 14-22, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  13. P. F. Linington, Open system interconnection (OSI), in Encyclopedia of Computer Science, 2003, pp. 1288-1289.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Ferraiolo, D. R. Kuhn, and R. Chandramouli, Role-based access control. Artech House, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  15. R. S. Sandhu and P. Samarati, Access control: principle and practice, IEEE communications magazine, vol. 32, no. 9, pp. 40-48, 1994.Google ScholarGoogle Scholar
  16. O. Shoewu and O. Idowu, Development of attendance management system using biometrics, The Pacific Journal of Science and Technology, vol. 13, no. 1, pp. 300¬307, 2012.Google ScholarGoogle Scholar
  17. J. H. Allen, S. Barnum, R. J. Ellison, G. McGraw, and N. R. Mead, Software security engineering. Pearson India, 2008.Google ScholarGoogle Scholar
  18. J. K. Millen, Covert channel capacity, in 1987 IEEE Symposium on Security and Privacy, 1987: IEEE, pp. 60-60.Google ScholarGoogle Scholar
  19. T. Karygiannis and L. Owens, Wireless Network Security. US Department of Commerce, Technology Administration, National Institute of ..., 2002.Google ScholarGoogle Scholar
  20. S. T. Zargar, J. Joshi, and D. Tipper, A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks, IEEE communications surveys & tutorials, vol. 15, no. 4, pp. 2046-2069, 2013.Google ScholarGoogle Scholar
  21. X. Lin, L. Lei, Y. Wang, J. Jing, K. Sun, and Q. Zhou, A measurement study on Linux container security: Attacks and countermeasures, in Proceedings of the 34th Annual Computer Security Applications Conference, 2018, pp. 418-429.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Noertjahyana, J. Andjarwirawan, and R. PANGALILA, Information Management System and Website Server Penetration Testing Case Study University, IJSEA, vol. 4, no. 4, pp. 169-173, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  23. R. G. Bace, Intrusion detection. Sams Publishing, 2000.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. A. Kemmerer and G. Vigna, Intrusion detection: a brief history and overview, Computer, vol. 35, no. 4, pp. sup127-sup130, 2002.Google ScholarGoogle Scholar
  25. B. Mukherjee, L. T. Heberlein, and K. N. Levitt, Network intrusion detection, IEEE network, vol. 8, no. 3, pp. 26-41, 1994.Google ScholarGoogle Scholar
  26. R. Verma and S. Bharti, A Survey of Network Attacks in Wireless Sensor Networks, in International Conference on Information, Communication and Computing Technology, 2020: Springer, pp. 50-63.Google ScholarGoogle ScholarCross RefCross Ref
  27. E. Nikolova and V. Jecheva, Some similarity coefficients and application of data mining techniques to the anomaly-based IDS, Telecommunication Systems, vol. 50, no. 2, pp. 127-135, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Z. He, T. Zhang, and R. B. Lee, Machine learning based DDoS attack detection from source side in cloud, in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), 2017: IEEE, pp. 114-120.Google ScholarGoogle Scholar
  29. https://cve.mitre.org/Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICSCC '21: Proceedings of the 2021 6th International Conference on Systems, Control and Communications
    October 2021
    59 pages
    ISBN:9781450389006
    DOI:10.1145/3510362

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 17 March 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)25
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format