This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.
Riona Maria Varghese,
Neeraja Anil,
Nidhin Anil,
Nikhil John Jose,
Arun Madhu,
Justin Mathew,
- Student, Department of Computer Science and Engineering, Saintgits College of Engineering, Pathamuttom, Kerala, India
- Student, Department of Computer Science and Engineering, Saintgits College of Engineering, Pathamuttom, Kerala, India
- Student, Department of Computer Science and Engineering, Saintgits College of Engineering, Pathamuttom, Kerala, India
- Student, Department of Computer Science and Engineering, Saintgits College of Engineering, Pathamuttom, Kerala, India
- Assistant Professor, Department of Computer Science and Engineering, Saintgits College of Engineering, Pathamuttom, Kerala, India
- Assistant Professor, Department of Computer Science and Engineering, Saintgits College of Engineering, Pathamuttom, Kerala, India
Abstract
In the ever-evolving field of cybersecurity, the need for accessible and user-friendly tools in the favor of beginner users has never been greater. The existing ethical hacking related operating systems, while powerful, often overwhelm beginners with their complexity. The main objective of this project is to bridge the gap by providing an operating system for novice cyber enthusiasts looking to explore the world of ethical hacking and security. The proposed operating system will provide informative and user-friendly applications that simulate different attacks such as XSS attack, SQL injection, Wi-Fi attacks, DDoS attacks, thereby allowing the users to gain hands-on experience of the same. The app will be developed using the PyQt6 framework for the frontend, with Firebase serving as the backend. The operating system is created using Linux From Scratch so as to provide a minimal system with only the needed tools. The applications provide a brief tutorial on what each attack is, what type of weakness it depends on, what exploits are possible. It also introduces the user to a few common sets of tools that are used for exploiting these attacks. As a unique learning platform, our operating system focuses on simplicity and aims to be a steppingstone for absolute beginners to be able to solidify their foundations and navigate through the field of cybersecurity with ease and confidence.
Keywords: Cybersecurity, Education, Ethical Hacking, Operating System, Linux
[This article belongs to Journal of Open Source Developments (joosd)]
Riona Maria Varghese, Neeraja Anil, Nidhin Anil, Nikhil John Jose, Arun Madhu, Justin Mathew. SECURIX: An open-source security-based Linux distribution for novice cyber security enthusiasts. Journal of Open Source Developments. 2024; 11(03):-.
Riona Maria Varghese, Neeraja Anil, Nidhin Anil, Nikhil John Jose, Arun Madhu, Justin Mathew. SECURIX: An open-source security-based Linux distribution for novice cyber security enthusiasts. Journal of Open Source Developments. 2024; 11(03):-. Available from: https://journals.stmjournals.com/joosd/article=2024/view=180883
References
- Shrivastava P, Jamal MS, Kataoka K. EvilScout: Detection and mitigation of evil twin attack in SDN enabled WiFi. IEEE Transactions on Network and Service Management. 2020 Feb 10;17(1):89-102.
- Rodríguez GE, Torres JG, Flores P, Benavides DE. Cross-site scripting (XSS) attacks and mitigation: A survey. Computer Networks. 2020 Jan 15;166:106960.
- Crespo-Martínez IS, Campazas-Vega A, Guerrero-Higueras ÁM, Riego-DelCastillo V, Álvarez-Aparicio C, Fernández-Llamas C. SQL injection attack detection in network flow data. Computers & Security. 2023 Apr 1;127:103093.
- Balarezo JF, Wang S, Chavez KG, Al-Hourani A, Kandeepan S. A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks. Engineering Science and Technology, an International Journal. 2022 Jul 1;31:101065.
- Linux K. Should I Use Kali Linux? | Kali Linux Documentation . Kali Linux. Should I Use Kali Linux? | Kali Linux Documentation; 2024 . Available from: https://www.kali.org/docs/introduction/should-i-use-kali-linux/
- Riverbank Computing | Introduction. Riverbankcomputing.com. 2024 . Available from: https://riverbankcomputing.com/software/pyqt/intro
- Gupta S, Gupta BB. Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art. International Journal of System Assurance Engineering and Management. 2017 Jan;8:512-30.
- Halbouni A, Ong LY, Leow MC. Wireless Security Protocols WPA3: A Systematic Literature Review. IEEE Access. 2023 Oct 9.
- BlackArch Linux – Penetration Testing Distribution. Hacking Reviews. 2014 . Available from: https://www.hacking.reviews/2017/09/blackarch-linux-penetration-testing.html
- Welcome to Linux From Scratch! . Linuxfromscratch.org. 2024 . Available from: https://www.linuxfromscratch.org/
Journal of Open Source Developments
Volume | 11 |
Issue | 03 |
Received | 03/06/2024 |
Accepted | 15/10/2024 |
Published | 04/11/2024 |