Skip to content

leetcode-1337/-LSSE-Linux-System-Security-Enhancer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

-LSSE-Linux-System-Security-Enhancer

Licence ReadMe

installation

Clone th repository

    git clone [email protected]:ahlyel-amine/-LSSE-Linux-System-Security-Enhancer.git LSSE

Install in the system after the installation in the system you can run the tool by running the command lsse

   cd LSSE
   bash install
   cd ..
   rm -rf LSSE

For simple use

For simple use just enter to the repository folder and run the executable located on ./bin/lsse

Usage

after updating the config file located on $(HOME)/.lsse/lsse.conf you can run the command lsse

    lsse

if you're using the executable or you want to move the config file to other location you can pass the config file to the command:

    lsse -c /path/to/conf/file/lsse.conf

or

    ./path/to/repository/bin/lsse -c /path/to/conf/file/lsse.conf

for help you can run the command and discover the command options :

    lsse -h

Description

LSSE is a tool in C that enhances the security of a Linux system by monitoring for suspicious activities and potential intrusions.

The LSSE tool addresses the issue of intrusion detection by monitoring system logs and network activity for patterns that indicate potential security breaches. It provides real-time alerts and logs detailed information about suspicious activities.


Key Features:

  • Real-time Monitoring: Continuously monitors system logs and network traffic for predefined suspicious patterns.
  • Intrusion Detection: Utilizes a set of rules to detect common intrusion attempts, such as unauthorized access, unusual user activities, and malware signatures.
  • Alert System: Sends real-time alerts via email and logs details about detected intrusions.
  • Network Traffic Analysis: Analyzes incoming and outgoing network packets to identify potential threats.
  • Report Generation: Generates detailed reports of security incidents for further analysis.

How the Tool Operates:

  • Initialization: On startup, LSSE reads configuration files to load the rules and thresholds for detecting suspicious activities.
  • Log Monitoring: Continuously monitors system logs (e.g., /var/log/auth.log, /var/log/syslog) for suspicious entries.
  • Network Traffic Analysis: Captures network packets using a packet sniffing library and analyzes them for known malicious patterns.
  • Detection: When a suspicious activity or pattern is detected, LSSE logs the event and triggers an alert.
  • Alert System: Sends an email alert to the system administrator with details of the detected threat and logs the event in a specified log file.
  • Report Generation: Periodically generates comprehensive reports of all detected intrusions and suspicious activities for review.

Results and Effectiveness:

  • Deployment: Deployed LSSE on a test server to monitor its effectiveness in detecting real-world security threats.
  • Detection Rate: Successfully identified multiple intrusion attempts during the testing phase, including unauthorized SSH access attempts and malware traffic.
  • Performance: Demonstrated low resource usage, ensuring that the tool does not significantly impact system performance.
  • Usability: Provided clear and actionable alerts and reports, enabling quick response to potential threats.

Releases

No releases published

Packages

No packages published