Keamanan Kernel Linux : Pendekatan Hardening dan Perlindungan terhadap Serangan Eksploitasi

Authors

  • Zalfa Dewi Zahrani Universitas Pelita Bangsa
  • Novianto Andi Hardiansyah Universitas Pelita Bangsa
  • Elkin Rilvani Universitas Pelita Bangsa

DOI:

https://doi.org/10.61132/merkurius.v3i1.620

Keywords:

Dirty COW, Mitigation, Hardening, SELinux, ASLR

Abstract

Linux kernel security is a critical aspect of ensuring the integrity and stability of operating systems. Vulnerabilities like Dirty COW (CVE-2016-5195) illustrate how exploitative threats can severely impact systems, particularly those that are not regularly updated. This study analyzes the working mechanism of Dirty COW, its impact, and mitigation strategies based on Linux kernel hardening techniques, including the use of security modules like SELinux and AppArmor, as well as the Address Space Layout Randomization (ASLR) technique. Through attack simulations and mitigation evaluations, the findings emphasize the importance of regularly applying kernel patches to maintain system security. This study aims to provide practical guidance for enhancing Linux kernel resilience against exploitation attacks.

References

Akamai. (2023). Xurum Exploits and Dirty COW: An Analysis. Retrieved from https://www.akamai.com

Anderson, R. J. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems (3rd ed.). Wiley.

Bovet, D. P., & Cesati, M. (2005). Understanding the Linux Kernel (3rd ed.). O'Reilly Media.

Canonical. (2023). Mitigation of Dirty COW on Ubuntu Systems. Retrieved from https://ubuntu.com

Chou, A., et al. (2001). An empirical study of operating systems errors. ACM Symposium on Operating Systems Principles, 73-88.

Corbet, J., Kroah-Hartman, G., & McPherson, A. (2009). Linux Kernel Development. Addison-Wesley.

Cowan, C., et al. (1998). StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. USENIX Security Symposium Proceedings, 63-78.

Google Project Zero. (2016). Dirty COW Exploit Analysis. Retrieved from https://googleprojectzero.blogspot.com

Grsecurity. (2016). Kernel Hardening: The Role of Grsecurity and PaX. Retrieved from https://grsecurity.net

Intel. (2016). Security Best Practices for Linux Systems. Retrieved from https://www.intel.com

Love, R. (2010). Linux Kernel Development (3rd ed.). Addison-Wesley.

Mitre. (2016). CVE-2016-5195. Retrieved from https://cve.mitre.org

NIST. (2016). National Vulnerability Database: CVE-2016-5195. Retrieved from https://nvd.nist.gov

Openwall Project. (2017). Linux Kernel Security Hardening: Openwall Patches. Retrieved from https://openwall.com

PaX Team. (2016). Address Space Layout Randomization (ASLR): Enhancing Linux Kernel Security. Retrieved from https://pax.grsecurity.net

Red Hat. (2016). Dirty COW Vulnerability and Its Impacts. Retrieved from https://www.redhat.com

Stallings, W. (2017). Operating Systems: Internals and Design Principles (9th ed.). Pearson.

Tanenbaum, A. S., & Bos, H. (2014). Modern Operating Systems (4th ed.). Pearson.

Torvalds, L. (2007). Linux Kernel Source Code. Available at https://kernel.org

Wagner, D., & Dean, D. (2001). Intrusion detection via static analysis. Proceedings of the IEEE Symposium on Security and Privacy, 156-168.

Downloads

Published

2025-01-06

How to Cite

Zalfa Dewi Zahrani, Novianto Andi Hardiansyah, & Elkin Rilvani. (2025). Keamanan Kernel Linux : Pendekatan Hardening dan Perlindungan terhadap Serangan Eksploitasi . Merkurius : Jurnal Riset Sistem Informasi Dan Teknik Informatika, 3(1), 169–177. https://doi.org/10.61132/merkurius.v3i1.620