A novel framework for combating network attacks using Iptables
Nikita Gandotra1 , Lalit Sen Sharma2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-3 , Page no. 226-237, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.226237
Online published on Mar 31, 2019
Copyright © Nikita Gandotra, Lalit Sen Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Nikita Gandotra, Lalit Sen Sharma, “A novel framework for combating network attacks using Iptables,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.226-237, 2019.
MLA Style Citation: Nikita Gandotra, Lalit Sen Sharma "A novel framework for combating network attacks using Iptables." International Journal of Computer Sciences and Engineering 7.3 (2019): 226-237.
APA Style Citation: Nikita Gandotra, Lalit Sen Sharma, (2019). A novel framework for combating network attacks using Iptables. International Journal of Computer Sciences and Engineering, 7(3), 226-237.
BibTex Style Citation:
@article{Gandotra_2019,
author = {Nikita Gandotra, Lalit Sen Sharma},
title = {A novel framework for combating network attacks using Iptables},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {226-237},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3822},
doi = {https://doi.org/10.26438/ijcse/v7i3.226237}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.226237}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3822
TI - A novel framework for combating network attacks using Iptables
T2 - International Journal of Computer Sciences and Engineering
AU - Nikita Gandotra, Lalit Sen Sharma
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 226-237
IS - 3
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
620 | 405 downloads | 193 downloads |
Abstract
Network attacks pose as grievous threat to the stability of the Internet and are a major security concern as they can breach the security of the network or even make the victim unavailable. The network attack packets can intercepted by using Iptables before they can reach the victim machine. Iptables is the standard firewall included in Linux distributions for handling the kernel Netfilter modules. The effectiveness of the defense provided by the Iptables firewall mainly depends on its rules. In this paper, we have proposed a novel framework with new customized Iptables rules for mitigating fifteen types of network attacks which include port scanning; denial of service attacks, TCP, UDP, and ICMP based attacks etc. The performance of Iptables with these rules is evaluated with the real experiments for examining the competence of firewall in managing the network traffic and security when subjected to attack flow along with the normal traffic. The performance of Iptables is recorded in the terms of CPU utilization for processing and Logs generation, Frame Loss Ratio and Efficiency. The attack traffic is generated using Scapy for execution of the attacks whereas the normal traffic is generated using a traffic generator called D-ITG. It was found that Iptables could successfully detect the network attack and performed really well during the mitigation of such attacks.
Key-Words / Index Term
Iptables, Netfilter, Scapy, DITG, network-attacks
References
[1] W. Su and J. Xu, "Performance Evaluations of Cisco ASA and Linux Iptables Firewall Solutions," May 2013.
[2] "Netfilter Project," [Online]. Available: www.netfilter.org. [Accessed 01 October 2017].
[3] "Iptables," 2017. [Online]. Available: http://www.Iptables.info/en/structure-of-Iptables.html. [Accessed 7 September 2017].
[4] "Monitoring and Tuning the Linux Networking Stack: Receiving Data," May 2016. [Online]. Available: https://blog.packagecloud.io/eng/2016/06/22/monitoring-tuning-linux-networking-stack-receiving-data/. [Accessed 27 September 2017].
[5] R. K. C. Chang, "Defending against Flooding-Based Distributed Denial-of-Service Attacks:A Tutorial," IEEE Communications Magazine, pp. 42-51, October 2002.
[6] "Scapy and its Documentation," 6 Nov 2017. [Online]. Available: https://scapy.readthedocs.io/en/latest/. [Accessed 22 October 2017].
[7] A. Botta, W. Donato, A. Dainotti, S. Avallone and A. Pescapé. [Online]. Available:http://traffic.comics.unina.it/software/ITG/ manual/. [Accessed 16 November 2017].
[8] O. Andreasson, 2001. [Online]. Available: http://onz.es/IpTables %20Tutorial.pdf. [Accessed 5 October 2017].
[9] M. Rash, Linux Firewalls- Attack Detection and Response, 2007.
[10] K. Chatterjee, "Design and Development of a Framework to Mitigate DoS/DDoS Attacks Using IPtables Firewall," International Journal of Computer Science and Telecommunications , vol. 4, no. 3, pp. 67-72, March 2013.
[11] B. Sharma and K. Bajaj, "Packet Filtering using IP Tables in Linux," International Journal of Computer Science Issues(IJCSI), vol. 8, no. 4, pp. 320-325, July 2011.
[12] B. Q. M. AL-Musawi, "Mitigating DoS/DDoS Attacks Using Iptables," International Journal of Engineering & Technology IJET-IJENS, vol. 12, no. 03, pp. 101-111, June 2012.
[13] S. Mirzaie, A. K. Elyato and D. A. Sarram, "Preventing of SYN Flood attack with iptables Firewall," in 2010 Second International Conference on Communication Software and Networks.
[14] M. Šimon, L. Huraj and M. Čerňanský, "Performance Evaluations of IPTables Firewall Solutions under DDoS attacks," Journal of Applied Mathematics Statistics and Informatics (JAMSI), vol. 11, no. 2, pp. 35-45, 2015.
[15] A. Balobaid, W. Alawad and H. Aljasim, "A Study on the Impacts of DoS and DDoS Attacks on Cloud and Mitigation Techniques," in 2016 International Conference on Computing, Analytics and Security Trends (CAST), College of Engineering Pune, India. Dec 19-21, 2016, 2016.
[16] M. Y. Arafat, M. M. Alam and F. Ahmed, "A Realistic Approach and Mitigation Techniques for Amplifying DDOS Attack on DNS," in Proceedings of 10th Global Engineering, Science and Technology Conference, BIAM Foundation, Dhaka, Bangladesh, 2-3 January, 2015.
[17] K. Salah, K. Elbadawi and R. Boutaba, "Performance Modelling and Analysis of Network Firewalls," IEEE Transactions on Network and Service Management, vol. 9, no. 1, pp. 12-20, March 2012.
[18] T. Hayajneh, B. J. Mohd, A. Itradat and A. N. Quttoum, "Performance and Information Security Evaluation with Firewalls," International Journal of Security and Its Applications, vol. 7, no. 6, pp. 355-372, 2013.
[19] S. M. Aaqib, "To Analyze Performance, Scalability & Security Mechanisms of Apache Web Server Vis-a-vis with contemporary Web Servers," University of Jammu. Available: [http://hdl.handle.net/10603/65175], Jammu, 2014.
[20] S. Mishra, S. Sonavane and A. Gupta, "Study of Traffic Generation Tools," International Journal of Advanced Research in Computer and Communication Engineering, (IJARCCE) Vol. 4, Issue 6, June 2015.
[21] "BULK Email," BESI Marketing Solutions, [Online]. Available: http://www.bulkemailsmsindia.com/. [Accessed 12 December 2017].
[22] "Bulk Email service," Mail Marketer, [Online]. Available: http://mailmarketer.in/.
[23] R. J. Shimonski, D. L. Shinder, T. W. Shinder and A. C.-. Henmi, Best Damn Firewall Book Period, Syngress, ISBN: 1-931836-90-6, 2003.
[24] S. Sharma, Y. Verma and A. Nadda, “Information Security: Cyber Security Challenges,” International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.1, pp.10-15, February (2019)
[25] P. Santra, “An Expert Forensic Investigation System for Detecting Malicious Attacks and Identifying Attackers in Cloud Environment,” International Journal of Scientific Research in Network Security and Communication, Volume-6, Issue-5, October 2018.