A Review Paper on Linux Mitigation & Countermeasures Against It's Vulnerabilities

Authors

  • Archit Rana  M.Tech, Raksha Shakti University, Ahmedabad, Gujarat, India
  • Chandresh Parekh  Assistant Professor, Raksha Shakti University, Ahmedabad, Gujarat, India

Keywords:

Red Hat Enterprise Linux, Shell Scripting, password policies, SE Linux.

Abstract

This paper is intended as finding some Linux vulnerabilities and it’s countermeasures for securing Linux operating systems. Here proposed Linux distribution is Red Hat Enterprise Linux . observing Linux system there are some vulnerabilities like unauthorized access done by booting and overwriting root password, granted to local user as super user, network level vulnerabilities, gaining rights on file permissions etc. which compromise the database confidentiality and security. By using shell scripting, limiting or restricting access to systems, network monitoring Linux tools, implementing password policies and Security enhanced Linux policies to overcome these kind of problems in Linux systems at server side or client side to make sure operating system security.

References

  1. Wander boessenkool,George hacker, bruce wolfe scott mcbrien Red hat enterprise Linux, system administrator -2
  2. Susan lauber, Philip sweany,Rudolf kastl,George hacker Red Hat System Administrator-1
  3. C. J. PeBenito, F. Mayer, and K. MacMillan. Refer-ence Policy for Security Enhanced Linux. In SELinux Symposium, 2006. H.H. Crokell, "Specialization and International Competitiveness," in Managing the Multinational Subsidiary, H. Etemad and L. S, Sulude (eds.), Croom-Helm, London, 1986. (book chapter style)
  4. S.Rajeswari, Dr. A.Ramamurthy, K.T.V Subbarao, "An Efficient Intrusion-Detection Mechanisms To Protect Manet From Attacks" , International Journal of Science Engineering and Advance Technology, IJSEAT, Vol 2, Issue 12, December-2014.
  5. P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitabil-ity of Failure: The Flawed Assumption of Security in Modern Computing Environments. In 21st National Information Systems Security Conference, pages 303-314. NSA, 1998.R. Caves, Multinational Enterprise and Economic Analysis, Cambridge University Press, Cambridge, 1982. (book style)
  6. R. Spencer, S. Smalley, P.Loscocco , M.Hibler, D. An- dersen, and J. Lepreau. The Flask Security Architec- ture: System Support for Diverse Security Policies. In The Eighth USENIX Security Symposium
  7. Ashvini T. Dheshmukh1, Dr. Parikshit. N . Mahalle 2 1 Department of Computer Engineering
  8. Crispin Cowan, Steve Beattie, Calton Pu, PerryWagle, and Virgil Gligor. SubDomain: Parsimonious Server Security. In USENIX 14th Systems Administration Conference (LISA), New Orleans, LA, December 2000

Downloads

Published

2018-01-31

Issue

Section

Research Articles

How to Cite

[1]
Archit Rana, Chandresh Parekh, " A Review Paper on Linux Mitigation & Countermeasures Against It's Vulnerabilities, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.1269-1274, November-December-2017.