Volltext-Downloads (blau) und Frontdoor-Views (grau)
  • search hit 6 of 920
Back to Result List

Linux security: Altering bash commands as a defensive measure against Attackers

  • Linux and Linux-based operating systems have been gaining more popularity among the general users and among developers. Many big enterprises and large companies are using Linux for servers that host their websites, some even require their developers to have knowledge about Linux OS. Even in embedded systems one can find many Linux-based OS that run them. With its increasing popularity, one canLinux and Linux-based operating systems have been gaining more popularity among the general users and among developers. Many big enterprises and large companies are using Linux for servers that host their websites, some even require their developers to have knowledge about Linux OS. Even in embedded systems one can find many Linux-based OS that run them. With its increasing popularity, one can deduce the need to secure such a system that many personnel rely on, be it to protect the data that it stores or to protect the integrity of the system itself, or even to protect the availability of the services it offers. Many researchers and Linux enthusiasts have been coming up with various ways to secure Linux OS, however new vulnerabilities and new bugs are always found, by malicious attackers, with every update or change, which calls for the need of more ways to secure these systems. This Thesis explores the possibility and feasibility of another way to secure Linux OS, specifically securing the terminal of such OS, by altering the commands of the terminal, getting in the way of attackers that have gained terminal access and delaying, giving more time for the response teams and for forensics to stop the attack, minimize the damage, restore operations, and to identify collect and store evidence of the cyber-attack. This research will discuss the advantages and disadvantages of various security measures and compare and contrast with the method suggested in this research. This research is significant because it paints a better picture of what the state of the art of Linux and Linux-based operating systems security looks like, and it addresses the concerns of security enthusiasts, while exploring new uncharted area of security that have been looked at as a not so significant part of protecting the OSes out of concern of the various limitations and problems it entails. This research will address these concerns while exploring few ways to solve them, as well as addressing the ideal areas and situations in which the proposed method can be used, and when would such method be more of a burden than help if used.show moreshow less

Download full text files

  • Masterthesis_AlKallas_AlHalabi_Adham.pdf
    eng

Export metadata

Statistics

frontdoor_oas
Metadaten
Document Type:Master's Thesis
Zitierlink: https://opus.hs-offenburg.de/8030
Bibliografische Angaben
Title (English):Linux security: Altering bash commands as a defensive measure against Attackers
Subtitle (English):Another Cyber Deception Approach to Security?
Author:Adham Al-Kallas Al-Halabi
Advisor:Dirk Westhoff, Erik Zenner
Year of Publication:2023
Granting Institution:Hochschule Offenburg
Page Number:80
Language:English
Inhaltliche Informationen
Institutes:Fakultät Medien (M) (ab 22.04.2021)
Institutes:Abschlussarbeiten / Master-Studiengänge / ENITS
DDC classes:000 Allgemeines, Informatik, Informationswissenschaft / 000 Allgemeines, Wissenschaft / 004 Informatik
GND Keyword:IT-Sicherheit; LINUX
Tag:CyberDeception; Security; Terminal
Formale Angaben
Open Access: Closed 
Licence (German):License LogoCreative Commons - CC0 1.0 - Universell - Public Domain Dedication