IJATCA solicits original research papers for the December – 2024 Edition.
Last date of manuscript submission is December 30, 2024.
A distributed denial-of-service (DDoS) attack is one of the most powerful weapons on the internet. Research indicates that several works been have done to mitigate DDoS attacks on Linux based Servers. However, the type of DDoS attack covered were mostly HTTP Get Flood attacks on port 80 and 443. More so, the IPTables firewall rules used were not automated using Bash scripts to make it portable and the firewall rules in most cases were written to mitigate attacks coming from a single IP address. This study will therefore expand the scope of the mitigating DDoS attacks using IPTables to include TCP SYN Flood attacks, UDP Flood attacks and PING (ICMP) Flood attacks. After carrying out the test when the BASH scripts have been executed, DDoS attacks in form of TCP SYN Flood, UDP Flood and ICMP (Ping) Flood were generated using HPing3 and they were successfully mitigated as the Linux Server dropped packets that make up these attacks while allowing legitimate traffic and users to access resources on the Server.
Waziri, I. M. (2016). Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies).
Wenhui Su, Junjie Xu (2013), “Performance Evaluations of Cisco ASA and Linux iptables Firewall Solutions” Master Thesis in Computer Network Engineering, School of Information Science, Computer and Electrical Engineering Halmstad University, Sweden
Sara A. B. (2018), Towards Securing Web Server Using IptablesUniversiti Sultan ZainalAbidin, Terengganu, Malaysia
Šimon M., HurajL. andČerňanský M. (2015). Performance Evaluations of IPTables Firewall Solutions under DDoS attacks, 11(2), University of SS. Cyril and Methodius, Trnava. JAMSI, 11 (2015), No. 2 35–45.
Rehman, R., & Rahman, O. U. R. (2010). Testing and Analysis of Personal Firewalls.
Russel, R. (2002), Linux 2.4 Packet Filtering HOWTO. http://www.netfilter.org/documentation/HOWTO/packet-filtering-HOWTO.html
Ramkumar B. N. & Subbulakshmi T. (2021), TCP SYN flood attack detection and prevention system using adaptive thresholding method. School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, India. ITM Web of conferences.
Qasim, B., & Al-Musawi, M. (2012). MITIGATING DoS/DDoS ATTACKS USING IPTABLES. International Journal of Engineering & Technology IJET-IJENS, 12(03), 1210803–1217474.
Mustafa A. and Suraiya P. (2016), “Analysis of Dos and DDos Attacks” International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-5, Issue-5) Department of Computer Science, Jamia Hamdard, New Delhi, India
M. G. Mihalos, S. I. Nalmpantis, K. Ovaliadis (2019), “Design and Implementation of Firewall Security Policies using Linux Iptables”, Journal of Engineering Science and Technology Review 12 (1) (2019) 80 – 86
Mirkovic, J., & Reiher, P. (2004). DoSDefense Mechanisms. 34(2), 39–54. http://delivery.acm.org/10.1145/1000000/997156/p39-mirkovic.pdf?ip=150.183.226.91&id=997156&acc=ACTIVE SERVICE&key=336BF258277217C3.336BF258277217 C3.4D4702B0C3E38B35.4D4702B0C3E38B35&__acm__=1519027992_7bc0bb359ba5bc79f940b61d45f461bc.
Lucian G. (2006), “Designing and Implementing Linux Firewalls and QoS using netflter, iproute2, NAT, and L7-flter”, 1st Edition, Packt Publishing.
Linde, P., Pumputis, M., & Rodr, G. (2015). iptables revisited : a not so ordinary firewall.
F., Konikiewicz, I. W., Markowski, M., Wyspianskiego, W., Networks, C., &Wyspianskiego, W. (2017). Analysis Of Performance and Efficiency OfHardware And Software Firewalls, 9(1), JACSM 2017, Vol. 9, No. 1, pp. 49 - 63 10.1515/jacsm-2017-0003. Department of Systems and Computer Networks, Wroclaw University of Science and Technology, Wroclaw, Poland
Emmanuel, A. (2018). A Game Theory Model for Detection and Mitigation of DDoS Attacks on Web Servers. Department of Information Management Technology, Federal University of Technology, Owerri
Deshpande, H. A. (2015). HoneyMesh : Preventing Distributed Denial of Service Attacks using Virtualized Honeypots. 4(08), 263–267. International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 4 Issue 08, August-2015
Cho, J., Kim, J., Lee, G., & Lee, H. (2015). DDoS Prevention System Using Multi-Filtering Method, 769–773. International Conference on Chemical, Material and Food Engineering (CMFE-2015)
Chatterjee, K. (2013). Design and Development of a Framework to Mitigate DoS/DDoS Attacks Using IPtables Firewall. International Journal of Computer Science and Telecommunication, 4(3), 67–72. http://www.ijcst.org/Volume4/Issue3/p11_4_3.pdf
Behrouz A. F. (2010), TCP/IP protocol suite, The McGraw-Hill Companies, Inc. Fourth Edition
Amadi, E. C., Ajanwachuku, N. C., Nwachukwu, V., Anyalewechi, I., & Shandilya, D. (2016). A Review on the Application of Game Theory to Computer. 03(13), 842–849. International Journal of Research
Amadi E. C, Ani E. E., Eke M. C., Jibiri J. E. (2015). An in-depth analysis of the possible approaches to detection and offensive defense of DDoS attack on network server, 3(11). IJRIT International Journal of Research In Information Technology, Volume 3, Issue 11, November 2015, Pg. 36-51
Adwitiya M., Srinidhi S., Vignesh C. J. (2016), “An Analytical Study on the Versatility of A Linux Based Firewall From a Security Perspective”, Department of Computer Science, Amrita Vishwa Vidyapeetham, Mysore Campus, Mysore-570026, Karnataka, India. Pg. 3-4
Al-musawi, B. Q. M. (2012). Mitigating DoS / DDoS Attacks Using IPTables. June, 101–111. International Journal of Engineering & Technology IJET-IJENS Vol: 12 No: 03
Wu, Q. (2012). The Research and Application of Firewall based on Netfilter. Physics Procedia, 25, 1231–1235.https://doi.org/10.1016/j.phpro.2012.03.225
Wu, Q., Shiva, S., Roy, S., Ellis, C., & Datla, V. (2010). On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks On Modeling and Simulation of Game Theory-based Defense Mechanisms against DoS and DDoS Attacks, (January). https://doi.org/10.1145/1878537.1878703.
IJATCA is fuelled by a highly dispersed and geographically separated team of dynamic volunteers. IJATCA calls volunteers interested to contribute towards the scientific development in the field of Computer Science.