Developing an Attack Warning Feature for Open Source Code

International Journal of Computer Science and Engineering |
© 2025 by SSRG - IJCSE Journal |
Volume 12 Issue 5 |
Year of Publication : 2025 |
Authors : Thi Ngoc Linh Tran |
How to Cite?
Thi Ngoc Linh Tran, "Developing an Attack Warning Feature for Open Source Code," SSRG International Journal of Computer Science and Engineering , vol. 12, no. 5, pp. 29-34, 2025. Crossref, https://doi.org/10.14445/23488387/IJCSE-V12I5P104
Abstract:
Network security is a major concern in today's digital era. Computer networks are constantly exposed to risks posed by hackers. To enhance network security, it is essential to have effective solutions that can scan for and detect signs of potential attacks. This study focuses on developing an attack alert feature using the open-source platform Nagios, one of the most widely used network monitoring tools. One of Nagios' key advantages is its open-source nature, which allows users to easily customize, edit, and add new features. The attack detection feature implemented in this project is based on an anomaly detection algorithm for TCP connection-oriented protocols. The algorithm is simple, easy to install, and capable of effectively detecting large-scale attacks using multiple techniques. When abnormal behavior is detected, Nagios sends an alert to the system administrator. With these capabilities, administrators can respond more proactively to potential threats and address issues at the early stages of an attack, minimizing damage and maintaining system integrity.
Keywords:
Attack Warning Fearture, Open Source Code, Nagios, Network Security, Network Monitoring Tool.
References:
[1] Muhammad Zakarya, “DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing,” World Applied Sciences Journal, vol. 23, no. 11, pp. 1418-1424, 2013.
[Google Scholar] [Publisher Link]
[2] G.S. Navale et al., “Detecting and Analyzing DDoS Attack Using Map Reduce in Hadoop,” International Journal of Industrial Electronics and Electrical Engineering, vol. 2, no. 2, pp. 56-58, 2014.
[Google Scholar] [Publisher Link]
[3] Tongguang Zhang, “Cumulative Sum Algorithm for Detecting SYN Flooding Attacks,” Arxiv, pp. 1-3, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Haining Wang, Danlu Zhang, and Kang G. Shin, “Detecting SYN Flooding Attacks,” Proceedings Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, New York, NY, USA, pp. 1530-1539, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Chin-Ling Chen, and Chieh-Min Chen, “An Early Detection of Distributed Denial of Service Attack,” Advanced Computational Paradigms and Hybrid Intelligent Computing, pp. 203-210, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Thomas Chapman et al., “Design and Development of a Comprehensive Cyber Security Competition Visualization System,” Intelligent Computing, pp. 1240-1249, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Mohd Faris Mohd Fuzi, Nur Fatin Mohammad Ashraf, and Muhammad Nabil Fikri Jamaluddin, “Integrated Network Monitoring Using Zabbix with Push Notification via Telegram,” Journal of Computing Research and Innovation, vol. 7, no. 1, pp. 155-163, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Tom Davies et al., “A Collaborative Intrusion Detection System Using Snort IDS Nodes,” Arxiv, pp. 1-23, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Mohd Faris Mohd Fuzi et al., “Performance Analysis of Open-Source Network Monitoring Software in Wireless Network,” Journal of Computing Research and Innovation, vol. 8, no. 2, pp. 31-44, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Subhajit Sahana et al., “Automatic Anomaly Detection by Network Traffic Analysis,” 2023 3rd International Conference on Innovative Sustainable Computational Technologies, Dehradun, India, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] John Hooft Toomey, “An Unsupervised Based Approach to Detecting Anomalies in Hazard Monitoring Networks,” Thesis, pp. 1-38, 2024.
[Google Scholar] [Publisher Link]