TY - GEN
T1 - Bugs in Security Onion
AU - Xu, Lifan
AU - Mogos, Gabriela
PY - 2021
Y1 - 2021
N2 - Once the development of information technology and network, the problem of information security is becoming increasingly prominent. The scope and content of network security threats continue to expand and evolve, and the network security situation and challenges are becoming increasingly severe and complex. It is becoming more and more important to perceive the network security situation, monitor the network operation status, and ensure the security of information assets.Security Onion (SO) is a free and opensource Linux distribution for threat hunting, enterprise security monitoring, and log management. Security Onion is used to monitor specific network traffic, detect intrusion actions, and stop the attacker from taking further actions. Bugs in other Linux versions of operating systems may also exist in SO.This paper presents some existing security bugs in Ubuntu and the Linux kernel and tests whether these exist and lead to security vulnerabilities that can be exploited in Security Onion as well. Kali Linux with Nmap and Metasploit-Framework is used to implement exploits.
AB - Once the development of information technology and network, the problem of information security is becoming increasingly prominent. The scope and content of network security threats continue to expand and evolve, and the network security situation and challenges are becoming increasingly severe and complex. It is becoming more and more important to perceive the network security situation, monitor the network operation status, and ensure the security of information assets.Security Onion (SO) is a free and opensource Linux distribution for threat hunting, enterprise security monitoring, and log management. Security Onion is used to monitor specific network traffic, detect intrusion actions, and stop the attacker from taking further actions. Bugs in other Linux versions of operating systems may also exist in SO.This paper presents some existing security bugs in Ubuntu and the Linux kernel and tests whether these exist and lead to security vulnerabilities that can be exploited in Security Onion as well. Kali Linux with Nmap and Metasploit-Framework is used to implement exploits.
U2 - 10.1145/3510362.3510363
DO - 10.1145/3510362.3510363
M3 - Conference Proceeding
SP - 1
EP - 6
BT - Proceedings of 2021 6th International Conference on Systems, Control and Communications
ER -