Automatic Traffic Control System for SOHO Computer Networks
Abstract
One can say without a shred of doubt that network security plays a significant role in the modern world. The problem with information security lies in the imperfection of the TCP/IP technology stack and software vulnerabilities. Major manufacturers of network equipment do not pay enough attention to the security infrastructure of the SOHO class network, which is mostly based on the hardware platform MIPS or ARM. To help solve this issue, one of the solutions is outlined in this article—an algorithm that ensures information security of small computer networks. This algorithm allows to identify suspicious network activity and eliminate threats through remote control of network equipment L3. Traffic processing is performed on a personal computer using an intrusion detection and prevention system, along with a system for analysis and information security events correlation. Information flows are redirected using port mirroring technology on a router. The traffic control system of the SOHO class computer network, which has weak computational capabilities at getaway hosts, functions on the basis of the client-server model using such programming languages as Python and C++. The combined use of these tools provided greater efficiency in the completion of a wide range of different tasks. Both manual and automated testing techniques were involved in the final evaluation of the solution. As part of evaluating the effectiveness of the proposed product, several experiments were conducted on the modelling of malicious network activity such as DoS and IP-spoofing. As a result, the system has successfully identified and eliminated all threats. It is recommended to use this solution for SOHO networks that have weak computational power at internetwork hosts and are lacking a comprehensive firewall.
Keywords
IDS IPS SIEM Network information security Information system Threats Vulnerability IntrusionReferences
- 1.Tadimety, P.R.: OSPF: A Network Routing Protocol, pp. 13–17. Apress, Berkeley (2015)Google Scholar
- 2.Annual Cybersecurity Report. www.cisco.com, https://www.cisco.com/c/dam/m/digital/elq-cmcglobal/witb/acr2018/acr2018final.pdf. Accessed 17 Oct 2018
- 3.Intrusion Detection System. United States Patent № US 6,405,318 B1, 11.06.2002/Craig H. RowlandGoogle Scholar
- 4.Gong, Y., et al.: Intrusion detection system combining misuse detection and anomaly detection using genetic network programming. In: 2009 ICCAS-SICE, Fukuoka, pp. 3463–3467 (2009)Google Scholar
- 5.TP-LINK® Provides Built-In Security and Parental Controls with New Homecare™ Protection. www.tp-link.com, https://www.tp-link.com/us/news-details-17529.html. Accessed 17 Oct 2018
- 6.Size of the global Internet of Things (IoT) market from 2009 to 2019 (in billion U.S. dollars). www.statista.com, https://www.statista.com/statistics/485136/global-internet-of-things-market-size/. Accessed 17 Oct 2018
- 7.Farooq, M.U., Waseem, M., Khairi, A., Mazhar, S.: A critical analysis on the security concerns of Internet of Things (IoT) (0975 8887). Int. J. Comput. Appl. 111, 1–6 (2015)Google Scholar
- 8.IoT Security & Privacy Trust Framework. https://otalliance.org, https://otalliance.org/system/files/files/initiative/documents/iot_trust_framework6-22.pdf. Accessed 17 Oct 2018
- 9.Chaipa, S., Eloff, M.M.: Towards the development of an effective intrusion detection model. In: 2017 Information Security for South Africa (ISSA), Johannesburg, pp. 32–39 (2017)Google Scholar
- 10.Pharr, M., Fernando, R.: GPU Gems 2: Programming Techniques, pp. 224–230. Addison-Wesley Professional, Boston (2005)Google Scholar
- 11.Lin, W.-C., Ke, S.-W., Tsai, C.-F.: CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Taiwan: Knowl.-Based Syst. 78, 13–21 (2015)Google Scholar
- 12.Di Pietro, R., Mancini, L.V.: Intrusion Detection Systems, 1st (edn.), pp. 65–92. Springer, Boston (2008)Google Scholar
- 13.Wang, D., Zhao, J., Huang, L.: Design of A Smart Monitoring and Control System for Aquaponics Based on OpenWrt, pp. 937–942. Atlantis Press, Hefei (2015)Google Scholar