You are on page 1of 6

FINAL YEAR PROJECT 20012/2013

Project Proposal for

INVESTIGATION ON LINUX SERVERS, SECURITY ISSUES

By:
Iago Castro Cuna, 000628811

Supervised by:
Kanti Chhabhadiya

Department of Computer & Communication Engineering


University of Greenwich
1 Project Description

1.1 Introduction

At present the number of Linux servers in the IT world is rapidly increasing. This is
mainly due to security and reliability reasons by being a very safe and powerful
operative system. However, there are vulnerabilities that can affect any Unix-based
system. My aim in this project will be to explore and identify the most common
security issues in a Linux Server along with the possible solutions.

In a first stage I will be implement a Local Network with a Linux Server and two
workstations. Once the Network is tested and running, the server will be configured
with the following services; Email server, Web server, SFTP, MySQL and SSH.

In order to check the vulnerability of the Linux Server, in the second stage I will
perform a set of hacking techniques divided in two sections:

Local Network Hacking (Attacking the server from inside the Local Network)
External Hacking (Attacking the server from outside the Local Network)

During these processes, a video will be recorded to illustrate the hacking techniques
performed.

To conclude; a series of configurations will be applied and documented to elevate the


security of the Server and prevent the Hacking techniques previously mentioned.

1.2 Background/Problem

By its nature, Linux is considered to be a very solid operative system due to the fact
that integrates common features of Unix, in terms of security. Despite of that, the
Linux administrator plays a key role in any security related concerns, therefore it is
really important to research and investigate constantly threads that affect any Network
and particularly the Servers.

Secure a Linux Server is a highly specialized task that must be carried out carefully
and with precision. It also requires great knowledge of the subject matter, in order to
achieve a high level of success. This project will be supported by Advanced Linux
Users and will make constant references to the Linux Community.

1.3 Aim and Objectives


This project will combine practical advises on how to secured a Linux Server and
what tools can be used to reinforce the security of the system. The major idea in terms
of security, reside in two important aspects, in the first place identifying the
weaknesses of the system and secondly find the ways to tackle the security issues in
the Network and specially in the Linux Server.

Through a careful configuration the chances to compromise the security from hacking
attacks can be reduced to the minimum. This is where the project will have more
emphasis. The final report and investigation will be aimed at those Linux users, who
want to strengthen the security of their servers.

2 Feasibility Study

2.1 Abstract

Security is the highest priority in the implementation of servers. This requires a


constant research and investigation of new threats. It also requires new configurations
to prevent hacking attacks and security issues. Since the servers are oriented to
provide services for a large number of users, most of the IT companies spend loads of
resources to secure their Servers. The number of Linux user has massively increased
due to its reinforced security. This reduces the cost to the companies or individuals
spend on security.

It could be said that Linux is a very emerging market, therefore a project of


“Investigation on Linux servers, security issues” is not just a secure value, is a
necessity.

2.2 Analysis and risks

Every proposal or idea has its limitations, in order to prevent the main constraints that
can compromise the success of the project, a feasible study has been made, in this
particular case the study is divided in the following sections.
2.2.1 Technical Feasibility

Bearing in mind that the project is essentially an exercise of investigation and


research, the technological risks are minimal. However there are a few risks
related with the Local Network implementation and mainly with the Linux
Server configuration.
The Network implementation barely carries any risks, yet is a simple LAN
(Local Area Network) composed by two workstations, a server, a router and a
switch. The troubleshooting would be very simple by using Network Tools
such as Ping and Tracerouter. The figure 1 below shows the Network Design:

Figure 1

Regarding to the Linux server installation, the biggest risks would be the
misconfiguration of the services previously mentioned, Web server, Email
server, SFTP, MySQL or SSH and the drop of these services. Fortunately
Linux is an open source operative system with a big community on internet
willing to help and a lot of resources to solve any issue. Also in order to avoid
the drop of the services a monitoring tool will be implemented.

It could be said that the technological risks of this research are minimal due to
the worldwide support and resources oriented to the Linux Operative System.

2.2.2 Operational Feasibility

This project is intended to be a work of diffusion aimed at Linux users and


administrators who want to improve the security of their servers; therefore the success
is subject to the quality of the investigation and research. The more detailed and clear
is the work the greater will be its diffusion.

It is very important to define clearly the different stages of the project and write in
detail all the configurations made to avoid confusions and misleading instructions. To
achieve satisfactory results, the following steps will be implemented:

An organized plan that guaranties the correct implementation of the project


Regular meetings with the supervisor to review the progress of the aim of this research
Test the project at every stage before the conclusion is drawn
Seeking advice from Linux Advanced Users and Administrators
Supervise the project before every submission stage
Review the literature of the project before the final submission
Save a backup of the server and also have different backups of the final report

By following the instructions above, the risks will be minimized and the probabilities
of achieving a high quality work will be guaranteed.

2.2.2 Economic Feasibility

Following the Linux philosophy which is essentially an operative system developed


by volunteers with non lucrative or profitable reasons, the success of this project will
not be a subject to any economic profit. It is worth to remark that this is a work of
investigation and research, yet the costs of the project will be insignificant.

It is worth highlighting that the objective of the whole projects in the Linux
Community to reinforce the security of the servers and reduce the impact of the
hacking attacks.

3 Conclusion

You might also like