Open Access   Article Go Back

Network Resource Management using Policy based Inward Traffic

Ishwar Dayal Singh1 , O. P. Gupta2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 1200-1203, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.12001203

Online published on May 31, 2019

Copyright © Ishwar Dayal Singh, O. P. Gupta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ishwar Dayal Singh, O. P. Gupta, “Network Resource Management using Policy based Inward Traffic,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1200-1203, 2019.

MLA Style Citation: Ishwar Dayal Singh, O. P. Gupta "Network Resource Management using Policy based Inward Traffic." International Journal of Computer Sciences and Engineering 7.5 (2019): 1200-1203.

APA Style Citation: Ishwar Dayal Singh, O. P. Gupta, (2019). Network Resource Management using Policy based Inward Traffic. International Journal of Computer Sciences and Engineering, 7(5), 1200-1203.

BibTex Style Citation:
@article{Singh_2019,
author = {Ishwar Dayal Singh, O. P. Gupta},
title = {Network Resource Management using Policy based Inward Traffic},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1200-1203},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4386},
doi = {https://doi.org/10.26438/ijcse/v7i5.12001203}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.12001203}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4386
TI - Network Resource Management using Policy based Inward Traffic
T2 - International Journal of Computer Sciences and Engineering
AU - Ishwar Dayal Singh, O. P. Gupta
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1200-1203
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
258 239 downloads 116 downloads
  
  
           

Abstract

The security and management of network has become a major issue in the arena of Internet. The attacker can access different types of data i.e. personal data, bank account data, and unauthorized use of system resources in campus network. Various policies and procedures have been developed to secure the network communication over the internet by employing firewalls, encryption, and virtual private networks. On the bases of security requirements, the firewall rules are created to monitor the incoming traffic. Packet filtering technique has become a regular and inexpensive approach to secure the transfer of data over the internet and is used as a first line of defense against attacks. IPTABLES is used to create, maintain and monitor packet filter rules in the Linux operating system. Strong filtering techniques in IPTABLES can be used to make a network robust in nature for securing data transfer or prevent it from attacks. In this paper, study is done, not only to safe guard the network Distributed Denial of Service (DDOS) attacks but also management the network bandwidth. The proposed policy script based on the size and count of packet, blocks the attacker for a period of time. With the use of this policy, it observed that 33.8% bandwidth is always available to genuine users of the IT services.

Key-Words / Index Term

Network Security, Packets, IPTABLES, Policy Script, Packet Count

References

[1] S. Taluja, P. K. Verma, R. L. Dua, “Network Security Using IP Firewalls”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 8, pp. 348-354, 2012.
[2] K. Joshi, T. Kashiparekh, “Implementing Firewall using IP Tables in Linux”, International Journal of Emerging Trends in Science and Technology, Vol. 3, No. 3, pp. 3634-3637, 2016.
[3] S. Kadam, P. S. Tambabde, A. J. Jayant, “Adaptive Packet Filtering Techniques for Linux Firewall”, International Journal of Advance Research, Ideas and Innovations in Technology, Vol. 3, No. 1, pp. 171-174, 2017.
[4] B. Q. M. AL Musawi, “Mitigating DoS/DDoS Attacks using IP Tables”, International Journal of Engineering and Technology, Vol. 12, No. 3, pp. 101-111, 2012.
[5] B. Sharma, K. Bajaj, “Packet filtering using IP Tables in Linux”. International Journal of Computer Science Issues, Vol. 8, No. 4, pp. 320-325, 2011.
[6] N. D. Lal, B. Ghorbani, S. Vaghri, “A Survey on the use of GNS3 for Virtualizing Computer Networks”, International Journal of Computer Science and Engineering, Vol. 5, No. 1, pp. 49-58, 2016.
[7] W. Makasiranondh, S. P. Maj, D. Veal, “Pedagogical evaluation of simulation tools usage in Network Technology Education”, World Transactions on Engineering and Technology Education, Vol. 8, No. 3, pp. 321-324, 2010.
[8] A. M, M. Montero, D. R, Manzano, “Design and Development of Hands-on Network Lab Experiments for Computer Science Engineers”, International Journal of Engineering Education, Vol. 33, No. 2, pp. 855-864, 2017.
[9] A. Jalaparthi, A.S. Kumar, “Monitoring and Analysis of Real time detection of traffic from twitter stream analysis”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 4, No. 3, pp. 34-37, 2016.
[10] P. M, A. S. Thanamani, “Real-time Packet Performances under Socket Application”, International Journal of Scientific Research in Network Security and Communication, Vol. 5, No. 3, pp. 84-89, 2017.