Low-End Embedded Linux Platform for Network Security Application – Port Scanning Detector | IEEE Conference Publication | IEEE Xplore

Low-End Embedded Linux Platform for Network Security Application – Port Scanning Detector


Abstract:

The purpose of this paper is to realize possible usage on embedded Linux platform for intrusion detection (port scan detection). The approach was to develop the software ...Show More

Abstract:

The purpose of this paper is to realize possible usage on embedded Linux platform for intrusion detection (port scan detection). The approach was to develop the software which performs port scan using half-open and udp technique. The software is then executed on Linux based single board computer (SBC) where run TS-Linux 2.4.23 kernel. Results show that the embedded port scan detector (EPSD) unit managed to be at par with the other known port scanning software, besides running on relatively low-end embedded platform. Hence, it is significant that the product has a very high market potential. Our test of the new system brings up satisfactory results for port scan detect activity under such hardware limitations.
Date of Conference: 20-22 December 2008
Date Added to IEEE Xplore: 06 January 2009
Print ISBN:978-0-7695-3489-3

ISSN Information:

Conference Location: Phuket, Thailand

1. Introduction

Embedded system is a system that was designed to serve specific tasks. Almost all embedded systems come in compact size, so users are able to use them as additional parts of other devices or construct specific applications with them. Embedded system has many advantages like high efficiency, long life usage, and economical energy consumption. Port scan attack detection is very important for security management. Many attackers perform port scans as a beginning to find out vulnerable hosts to compromise. Detecting such port scans indicates incoming network intrusions. Besides, recent worm epidemics, such as Code Red-II, and Nimda scan other vulnerable hosts for propagation [1], [2]. Network supervisors can prevent viruses from spreading by detecting port scanning activity and prohibiting them. A port scan is typically initiated by sending some packets from a host through the same port to various destinations and ports. If any destination has a service listening on the scanned port, the connection is established and a reply is sent back. From the reply, the attacker (or the worm) could know whether a service is available on the scanned port. It will try to exploit security problems of the service for further intrusion. There are two access patterns of port scans, horizontal (multiple destinations, same ports) and vertical (same destination, multiple ports). To detect port scans early and prevent their further damage, many networks employ Network Intrusion Detection Systems (NIDS) at network entrances. Intrusion Detection System (IDS) detects intrusions, normally defined as compromises of a system's confidentiality, integrity, or availability properties [3], [4]. The network administrator uses the port scanning technique to determine what network-aware applications are running on the network. The security consultant uses the port scanning technique to find potential security issues and violations [5].

Contact IEEE to Subscribe

References

References is not available for this document.