Advertisement

NetGuard: Securing Network Environment Using Integrated OpenVPN, Pi-Hole, and IDS on Raspberry Pi

  • Abidah Mat TaibEmail author
  • Muhammad Tholhah Zabri
  • Nor Azira Mohd Radzi
  • Evizal Abdul Kadir
Conference paper
  • 10 Downloads

Abstract

Owing to online dependency, almost all personal gadgets are connected to the internet. Socializing, working, satisfying hobbies in sports and entertainment all over the world are no longer a problem for ASEAN countries’ users. Unfortunately, some of these users are unaware that they are exposed to threats since their personal online activities could be scrutinized and tracked by malicious parties. Besides, the users are potentially becoming victims of phishing and also the man-in-the-middle (MiTM) attack. In safeguarding the internet users, online activities need to be secured. Not everybody is well versed technically on the subject. Trainings or buying special devices for that purpose is costly and time-consuming, which is unappreciated by layman person. This paper discussed NetGuard, an integrated tool that hides the user’s internet protocol (IP) by masking it with OpenVPN server deployed in another country, secure users from being tracked by an attacker on internet and blocks any domain name system (DNS) request for known tracking and advertising domain by using Pi-Hole project. NetGuard was tested and its feedbacks were documented. The result showed respondents satisfactions with the NetGuard’s ability to maintain secrecy online and the network performance was not significantly degraded. As a whole, its usage possibly reduces the digital gaps especially between the ASEAN countries.

Keywords

NetGuard Raspberry Pi Intrusion detection system (IS) Man-in-the-middle OpenVPN Pi-Hole 

References

  1. Chandar H (2018) Six signs you are being hacked | New Straits Times | Malaysia General Business Sports and Lifestyle News. https://www.nst.com.my/opinion/letters/2018/04/355376/six-signs-you-are-being-hacked
  2. Day D, Burns B (2011) A performance analysis of Snort and Suricata network intrusion detection and prevention engines. In: Fifth international conference on digital society, Gosier, Guadeloupe, pp 187–192Google Scholar
  3. Findlay H (2014) Mobile technologies transforming the brain and impacting various aspects of societal life. J Healthc, Sci HumIties 5(2):93–113Google Scholar
  4. Gay W (2014) Raspberry Pi hardware reference. Technology in action. https://www.raspberrypi.org/
  5. Hosner C (2004) OpenVPN and the SSL VPN Revolution. Security 10–38. http://www.sans.org/reading-room/whitepapers/vpns/openvpn-ssl-vpn-revolution-1459
  6. Jobber D, Lancaster G (2009) Selling and sales management. Bus Horiz 50(3):185–191Google Scholar
  7. Jodoin E (2013) SOHO remote access VPN. Easy as Pie, Raspberry Pi. SANS Institute Reading Room, 41Google Scholar
  8. Komal N, Shriniwas S (2013) A new approach towards the onion router network using an attack dependent on cell-counting. Int J Emerg Technol Adv Eng 3(7):500–507Google Scholar
  9. Lales C, Carranza A (2013) Using the Raspberry Pi to establish a Virtual Private Network (VPN) connection to a home network. http://www.asee.org/documents/zones/zone1/2014/Student/PDFs/226.pdf
  10. Metz C (2003) IEEE Internet Comput 7(1):87–91Google Scholar
  11. Nadiammai GV, Hemalatha M (2014) Effective approach toward intrusion detection system using data mining techniques. Egypt Inform J 15(1):37–50CrossRefGoogle Scholar
  12. Parmar A, Dedegikas C, Toms M, Dickert C (2015) Adblock plus efficacy study. Technical Report, Simon Fraser University. https://www.sfu.ca/content/sfu/genericdept/eryn/drag-a-pdf/_jcr_content/main_content/download/file.res/Adblock.Plus.Study.pdf
  13. Poonia P, Kumar V, Nasa C (2017) Performance evaluation of network based intrusion detection techniques with Raspberry Pi—a comparative analysis. Int J Eng Res Technol (IJERT) 5(10):1–6. ISSN: 2278-0181. In: ICCCS—2017 conference proceedings, Published by, www.ijert.org
  14. Robinson and Cole (2017) Virtual Private Network (VPN) Providers: How Private Are They? JDSUPRA. http://jdsupra.com/legalnews/virtual-private-network-vpn-providers-35789
  15. Salmela J, Schapper C (2018) Block Ads network-wide with A Raspberry Pi-hole. https://piphole.net
  16. Saric S, Perakovic D, Bara D (1998) Problem of information security traffic on internet. Promet—Traffic—Traffico 10(1–2):61–66Google Scholar
  17. Sforzin A, Marmol FG, Conti M, Bohli JM (2017) RPiDS: Raspberry Pi IDS—a fruitful intrusion detection system for IoT. RPiDS: Raspberry Pi IDS a fruitful intrusion detection system for IoT, pp 440–448Google Scholar
  18. Skendzic A, Kovacic B (2017) Open source system OpenVPN in a function of Virtual Private Network. IOP Conf Ser: Mater Sci Eng 200(1):012065Google Scholar
  19. Wan Alias WNH (2015) Lima minit godam data agensi kerajaan | BHplus | Berita Harian. https://www.bharian.com.my/node/52812

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Abidah Mat Taib
    • 1
    Email author
  • Muhammad Tholhah Zabri
    • 1
  • Nor Azira Mohd Radzi
    • 2
  • Evizal Abdul Kadir
    • 3
  1. 1.Faculty of Computer and Mathematical SciencesUniversiti Teknologi MARAArauMalaysia
  2. 2.Academy of Language Studies, Universiti Teknologi MARAArauMalaysia
  3. 3.Faculty of EngineeringUniversitas Islam RiauPekanbaruIndonesia

Personalised recommendations