Provides a New Way to Enhance Security in the Linux Operating System

Hamid Reza Ganji, Kiarash Aghakhani

Abstract


The security of the configuration of files in the Linux operating system depends on many factors that can be referenced to the system level and the applicable level. The most important thing about the security of Linux operating systems is its dynamism, for example, when you secure your Linux system, it will not stay safe forever, because applications and cyber criminals through new threats and/or new exploits that are packaged Systems or applications that cause the operating system to become unsafe, for this reason, we need a secure operating system. The main purpose of this article is to provide a new way to enhance the security of the Linux operating system. For this purpose, how can simple, continuous, and practical Linux environment be secured, solutions are presented, also based on performance analysis of the proposed method and evaluation parameters for existing systems against the proposed system, the superiority of this method is introduced.

Keywords


Linux Operating System; Security in the Operating System; Attacks on the Operating System; Computer Security; Security Parameters.

References


Barisani, Andrea, and Thomas Bader. "Hacking Linux Exposed Linux security and secerets." (2008).

Cheminod, Manuel, Luca Durante, and Adriano Valenzano. “Review of Security Issues in Industrial Networks.” IEEE Transactions on Industrial Informatics 9, no. 1 (February 2013): 277–293. doi:10.1109/tii.2012.2198666.

Dheshmukh, Ashvini T., and Parikshit N. Mahalle. "Survey on Linux Security and Vulnerabilities." International Journal of Engineering And Computer Science 3, no. 09 (2014): 8265-8269.

Red Hat Engineering Content Services, Red Hat Enterprise Linux 6 Security Guide A Guide to Securing Red Hat Enterprise Linux, Edition 3, 2011.

Ben-Porat, U., A. Bremler-Barr, and H. Levy. “Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks.” IEEE Transactions on Computers 62, no. 5 (May 2013): 1031–1043. doi:10.1109/tc.2012.49.

Edwards, Nigel, Joubert Berger, and Tse Huong Choo. "A secure linux platform." In Proceedings of the 5th annual Linux Showcase & Conference-Volume 5, pp. 3-3. USENIX Association, 2001.

Lindskog, Stefan, and Erland Jonsson. "Different Aspects of Security Problems in Network Operating Systems." In Proceedings of the Third Annual International Systems Security Engineering Association Conference (2002 ISSEA Conference). 2002.

Holm, Hannes, Mathias Ekstedt, and Dennis Andersson. “Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks.” IEEE Transactions on Dependable and Secure Computing 9, no. 6 (November 2012): 825–837. doi:10.1109/tdsc.2012.66.

James Turnbull, “hardening Linux”, 2005.

Loscocco, Peter A., Stephen D. Smalley, Patrick A. Muckelbauer, Ruth C. Taylor, S. Jeff Turner, and John F. Farrell. "The inevitability of failure: The flawed assumption of security in modern computing environments." In Proceedings of the 21st National Information Systems Security Conference, vol. 10, pp. 303-314. 1998.

Jaromír Hradílek Red Hat, Inc. Engineering Content Services,”Red Hat Enterprise Linux 6 Deployment Guide Deployment, Configuration and Administration of Red Hat Enterprise Linux”, Edition 3, 2012.


Full Text: PDF

DOI: 10.28991/esj-2018-01153

Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Hamid Reza Ganji, Kiarash Aghakhani