Advertisement

Automatic Traffic Control System for SOHO Computer Networks

  • Evgeny Basinya
  • Aleksander RudkovskiyEmail author
Conference paper
Part of the Studies in Systems, Decision and Control book series (SSDC, volume 199)

Abstract

One can say without a shred of doubt that network security plays a significant role in the modern world. The problem with information security lies in the imperfection of the TCP/IP technology stack and software vulnerabilities. Major manufacturers of network equipment do not pay enough attention to the security infrastructure of the SOHO class network, which is mostly based on the hardware platform MIPS or ARM. To help solve this issue, one of the solutions is outlined in this article—an algorithm that ensures information security of small computer networks. This algorithm allows to identify suspicious network activity and eliminate threats through remote control of network equipment L3. Traffic processing is performed on a personal computer using an intrusion detection and prevention system, along with a system for analysis and information security events correlation. Information flows are redirected using port mirroring technology on a router. The traffic control system of the SOHO class computer network, which has weak computational capabilities at getaway hosts, functions on the basis of the client-server model using such programming languages as Python and C++. The combined use of these tools provided greater efficiency in the completion of a wide range of different tasks. Both manual and automated testing techniques were involved in the final evaluation of the solution. As part of evaluating the effectiveness of the proposed product, several experiments were conducted on the modelling of malicious network activity such as DoS and IP-spoofing. As a result, the system has successfully identified and eliminated all threats. It is recommended to use this solution for SOHO networks that have weak computational power at internetwork hosts and are lacking a comprehensive firewall.

Keywords

IDS IPS SIEM Network information security Information system Threats Vulnerability Intrusion 

References

  1. 1.
    Tadimety, P.R.: OSPF: A Network Routing Protocol, pp. 13–17. Apress, Berkeley (2015)Google Scholar
  2. 2.
  3. 3.
    Intrusion Detection System. United States Patent № US 6,405,318 B1, 11.06.2002/Craig H. RowlandGoogle Scholar
  4. 4.
    Gong, Y., et al.: Intrusion detection system combining misuse detection and anomaly detection using genetic network programming. In: 2009 ICCAS-SICE, Fukuoka, pp. 3463–3467 (2009)Google Scholar
  5. 5.
    TP-LINK® Provides Built-In Security and Parental Controls with New Homecare™ Protection. www.tp-link.com, https://www.tp-link.com/us/news-details-17529.html. Accessed 17 Oct 2018
  6. 6.
    Size of the global Internet of Things (IoT) market from 2009 to 2019 (in billion U.S. dollars). www.statista.com, https://www.statista.com/statistics/485136/global-internet-of-things-market-size/. Accessed 17 Oct 2018
  7. 7.
    Farooq, M.U., Waseem, M., Khairi, A., Mazhar, S.: A critical analysis on the security concerns of Internet of Things (IoT) (0975 8887). Int. J. Comput. Appl. 111, 1–6 (2015)Google Scholar
  8. 8.
  9. 9.
    Chaipa, S., Eloff, M.M.: Towards the development of an effective intrusion detection model. In: 2017 Information Security for South Africa (ISSA), Johannesburg, pp. 32–39 (2017)Google Scholar
  10. 10.
    Pharr, M., Fernando, R.: GPU Gems 2: Programming Techniques, pp. 224–230. Addison-Wesley Professional, Boston (2005)Google Scholar
  11. 11.
    Lin, W.-C., Ke, S.-W., Tsai, C.-F.: CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Taiwan: Knowl.-Based Syst. 78, 13–21 (2015)Google Scholar
  12. 12.
    Di Pietro, R., Mancini, L.V.: Intrusion Detection Systems, 1st (edn.), pp. 65–92. Springer, Boston (2008)Google Scholar
  13. 13.
    Wang, D., Zhao, J., Huang, L.: Design of A Smart Monitoring and Control System for Aquaponics Based on OpenWrt, pp. 937–942. Atlantis Press, Hefei (2015)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Novosibirsk State Technical UniversityNovosibirskRussian Federation
  2. 2.Institute of Information and Communication TechnologiesNovosibirskRussian Federation

Personalised recommendations