Read More.

Call for Paper - December – 2024 Edition   

(SJIF Impact Factor: 5.966) (IJIFACTOR 3.8, RANKING: A+) (PIF: 3.460)

IJATCA solicits original research papers for the December – 2024 Edition.
Last date of manuscript submission is December 30, 2024.

                                                   

An Enhanced Model for Mitigating DDoS Attacks on Linux Servers using IPTables and Bash scripts


Volume: 8 Issue: 2
Year of Publication: 2021
Authors: Nwachukwu V. C, Ikerionwu C. O, John-Otumu A. M



Abstract

A distributed denial-of-service (DDoS) attack is one of the most powerful weapons on the internet. Research indicates that several works been have done to mitigate DDoS attacks on Linux based Servers. However, the type of DDoS attack covered were mostly HTTP Get Flood attacks on port 80 and 443. More so, the IPTables firewall rules used were not automated using Bash scripts to make it portable and the firewall rules in most cases were written to mitigate attacks coming from a single IP address. This study will therefore expand the scope of the mitigating DDoS attacks using IPTables to include TCP SYN Flood attacks, UDP Flood attacks and PING (ICMP) Flood attacks. After carrying out the test when the BASH scripts have been executed, DDoS attacks in form of TCP SYN Flood, UDP Flood and ICMP (Ping) Flood were generated using HPing3 and they were successfully mitigated as the Linux Server dropped packets that make up these attacks while allowing legitimate traffic and users to access resources on the Server.

References

  1. Waziri, I. M. (2016). Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies).

  2. Wenhui Su, Junjie Xu (2013), “Performance Evaluations of Cisco ASA and Linux iptables Firewall Solutions” Master Thesis in Computer Network Engineering, School of Information Science, Computer and Electrical Engineering Halmstad University, Sweden

  3. Sara A. B. (2018), Towards Securing Web Server Using IptablesUniversiti Sultan ZainalAbidin, Terengganu, Malaysia

  4. Šimon M., HurajL. andČerňanský M. (2015). Performance Evaluations of IPTables Firewall Solutions under DDoS attacks, 11(2), University of SS. Cyril and Methodius, Trnava. JAMSI, 11 (2015), No. 2 35–45.

  5. Rehman, R., & Rahman, O. U. R. (2010). Testing and Analysis of Personal Firewalls.

  6. Russel, R. (2002), Linux 2.4 Packet Filtering HOWTO. http://www.netfilter.org/documentation/HOWTO/packet-filtering-HOWTO.html

  7. Ramkumar B. N. & Subbulakshmi T. (2021), TCP SYN flood attack detection and prevention system using adaptive thresholding method. School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, India. ITM Web of conferences.

  8. Qasim, B., & Al-Musawi, M. (2012). MITIGATING DoS/DDoS ATTACKS USING IPTABLES. International Journal of Engineering & Technology IJET-IJENS, 12(03), 1210803–1217474.

  9. Mustafa A. and Suraiya P. (2016), “Analysis of Dos and DDos Attacks” International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-5, Issue-5) Department of Computer Science, Jamia Hamdard, New Delhi, India

  10. M. G. Mihalos, S. I. Nalmpantis, K. Ovaliadis (2019), “Design and Implementation of Firewall Security Policies using Linux Iptables”, Journal of Engineering Science and Technology Review 12 (1) (2019) 80 – 86

  11. Mirkovic, J., & Reiher, P. (2004). DoSDefense Mechanisms. 34(2), 39–54. http://delivery.acm.org/10.1145/1000000/997156/p39-mirkovic.pdf?ip=150.183.226.91&id=997156&acc=ACTIVE SERVICE&key=336BF258277217C3.336BF258277217 C3.4D4702B0C3E38B35.4D4702B0C3E38B35&__acm__=1519027992_7bc0bb359ba5bc79f940b61d45f461bc.

  12. Lucian G. (2006), “Designing and Implementing Linux Firewalls and QoS using netflter, iproute2, NAT, and L7-flter”, 1st Edition, Packt Publishing.

  13. Linde, P., Pumputis, M., & Rodr, G. (2015). iptables revisited : a not so ordinary firewall.

  14. F., Konikiewicz, I. W., Markowski, M., Wyspianskiego, W., Networks, C., &Wyspianskiego, W. (2017). Analysis Of Performance and Efficiency OfHardware And Software Firewalls, 9(1), JACSM 2017, Vol. 9, No. 1, pp. 49 - 63 10.1515/jacsm-2017-0003. Department of Systems and Computer Networks, Wroclaw University of Science and Technology, Wroclaw, Poland

  15. Emmanuel, A. (2018). A Game Theory Model for Detection and Mitigation of DDoS Attacks on Web Servers. Department of Information Management Technology, Federal University of Technology, Owerri

  16. Deshpande, H. A. (2015). HoneyMesh : Preventing Distributed Denial of Service Attacks using Virtualized Honeypots. 4(08), 263–267. International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 4 Issue 08, August-2015

  17. Cho, J., Kim, J., Lee, G., & Lee, H. (2015). DDoS Prevention System Using Multi-Filtering Method, 769–773. International Conference on Chemical, Material and Food Engineering (CMFE-2015)

  18. Chatterjee, K. (2013). Design and Development of a Framework to Mitigate DoS/DDoS Attacks Using IPtables Firewall. International Journal of Computer Science and Telecommunication, 4(3), 67–72. http://www.ijcst.org/Volume4/Issue3/p11_4_3.pdf

  19. Behrouz A. F. (2010), TCP/IP protocol suite, The McGraw-Hill Companies, Inc. Fourth Edition

  20. Amadi, E. C., Ajanwachuku, N. C., Nwachukwu, V., Anyalewechi, I., & Shandilya, D. (2016). A Review on the Application of Game Theory to Computer. 03(13), 842–849. International Journal of Research

  21. Amadi E. C, Ani E. E., Eke M. C., Jibiri J. E. (2015). An in-depth analysis of the possible approaches to detection and offensive defense of DDoS attack on network server, 3(11). IJRIT International Journal of Research In Information Technology, Volume 3, Issue 11, November 2015, Pg. 36-51

  22. Adwitiya M., Srinidhi S., Vignesh C. J. (2016), “An Analytical Study on the Versatility of A Linux Based Firewall From a Security Perspective”, Department of Computer Science, Amrita Vishwa Vidyapeetham, Mysore Campus, Mysore-570026, Karnataka, India. Pg. 3-4

  23. Al-musawi, B. Q. M. (2012). Mitigating DoS / DDoS Attacks Using IPTables. June, 101–111. International Journal of Engineering & Technology IJET-IJENS Vol: 12 No: 03

  24. Wu, Q. (2012). The Research and Application of Firewall based on Netfilter. Physics Procedia, 25, 1231–1235.https://doi.org/10.1016/j.phpro.2012.03.225

  25. Wu, Q., Shiva, S., Roy, S., Ellis, C., & Datla, V. (2010). On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks On Modeling and Simulation of Game Theory-based Defense Mechanisms against DoS and DDoS Attacks, (January). https://doi.org/10.1145/1878537.1878703.

Keywords




© 2023 International Journal of Advanced Trends in Computer Applications
Foundation of Computer Applications (FCA), All right reserved.
Vision & Mission | Privacy Policy | Terms and Conditions