Research Article
BibTex RIS Cite

Raspberry Pi ile Güvenlik Duvarı ve Saldırı Tespit Sistemi

Year 2020, Volume: 3 Issue: 2, 21 - 24, 22.09.2020
https://doi.org/10.38016/jista.653486

Abstract

Bilgi, işletmeler için en temel yapıtaşıdır. Bu nedenle bilgi üzerinde yeterli kontrol sahibi olmak vazgeçilmezdir. Bu kontrol, bir şirket için daha iyi güvenlik ve genel yönetim sağlar. Bu güvenliği sağlamanın yolu bütün ağı denetlecek bir güvenlik duvarı kurmaktır. Güvenlik duvarı şirketlerin ağları üzerindeki cihazları ve bilgisayarları diğer ağlar üzerinden gelecek saldırılara karşı koruyan, iç ve dış ağlar arası ağ trafiğini belirli kurallara göre denetleyen bir güvenlik mekanizmasıdır. Güvenlik duvarı üzerinde belirtilmiş kurallara uymayan trafik engelleyerek koruma sağlanır. Bu çalışmada düşük maliyetli cep bilgisayarı Raspberry Pi ve ağ anahtarı kullanılarak küçük veya orta ölçekli bir işyeri ağı modellemesi üzerinde güvenlik duvarı ve saldırı tespit sistemi yapılmıştır. Bu ağa bağlı bilgisayarlara Raspberry Pi üzerinden internet erişimi sağlanmıştır. Ağdaki bilgisayarlara yapılan ataklar Raspberry Pi üzerinden gözlemlenmiştir ve yazılan kurallar sayesinde kolayca engellenmiştir.

References

  • Bellovin, S. M., & Cheswick, W. R. (1994). Network firewalls. IEEE communications magazine, 32(9), 50-57.
  • Ashoor, A. S., & Gore, S. (2011). What is the difference between Hackers and Intruders. Int. J. Sci. Eng. Res, 2(7), 1-3.
  • Lalitha, M., Meachery, N., & Nair, R. (2018). Raspberry PI Based Cyber-Defensive Industrial Control SystemWith Redundancy And Intrusion Detection. International Journal of Pure and Applied Mathematics, 118(20), 4273-4278.
  • Coşar, M., & Kiran, H. E. (2018, May). Measurement of Raspberry Pi performance in network traffic analysis. In 2018 26th Signal Processing and Communications Applications Conference (SIU) (pp. 1-4). IEEE.
  • Coşar, M., & Karasartova, S. (2017, October). A firewall application on SOHO networks with Raspberry Pi and snort. In 2017 International Conference on Computer Science and Engineering (UBMK) (pp. 1000-1003). IEEE.
  • Mahajan, S., Adagale,M. A., & Sahare, C.(2016, March). Intrusion Detection System Using Raspberry PI Honeypot in Network Security. International Journal of Engineering Science and Computing, Volume 6, No:3, DOI 10.4010/2016.651.
  • Roesch, M. (1999, November). Snort: Lightweight intrusion detection for networks. In Lisa (Vol. 99, No. 1, pp. 229-238).
  • Oktay, U., & Sahingoz, O. K. (2013, May). Proxy network intrusion detection system for cloud computing. In 2013 the international conference on technological advances in electrical, electronics and computer engineering (TAEECE) (pp. 98-104). IEEE.
  • Karahan, O., Kaya, B., 2019, September. Raspberry Pi Firewall and Intrusion Detection System. In 2019 10th International Symposium on Intelligent and Manufacturing Systems (pp. 523-529).

Raspberry Pi Firewall and Intrusion Detection System

Year 2020, Volume: 3 Issue: 2, 21 - 24, 22.09.2020
https://doi.org/10.38016/jista.653486

Abstract

Information is the most essential building block to businesses, thus having adequate control over it is indispensability for most. Such control allows for better security and overall administration for a company. The existing solution is to install a firewall to the root switch, enabling admins to manage traffic by interfacing with the firewall equipment. This paper proposes a light-weight and highly configurable firewall solution for small to mid-range businesses. Built on a Raspberry Pi, including a user-friendly interface, with little information individuals will able to configure and install the firewall to their businesses. The proper solution will enable high-level control over the desired ports and user groups. Access to potentially harmful information can effortlessly be moderated and blocked if necessary.

References

  • Bellovin, S. M., & Cheswick, W. R. (1994). Network firewalls. IEEE communications magazine, 32(9), 50-57.
  • Ashoor, A. S., & Gore, S. (2011). What is the difference between Hackers and Intruders. Int. J. Sci. Eng. Res, 2(7), 1-3.
  • Lalitha, M., Meachery, N., & Nair, R. (2018). Raspberry PI Based Cyber-Defensive Industrial Control SystemWith Redundancy And Intrusion Detection. International Journal of Pure and Applied Mathematics, 118(20), 4273-4278.
  • Coşar, M., & Kiran, H. E. (2018, May). Measurement of Raspberry Pi performance in network traffic analysis. In 2018 26th Signal Processing and Communications Applications Conference (SIU) (pp. 1-4). IEEE.
  • Coşar, M., & Karasartova, S. (2017, October). A firewall application on SOHO networks with Raspberry Pi and snort. In 2017 International Conference on Computer Science and Engineering (UBMK) (pp. 1000-1003). IEEE.
  • Mahajan, S., Adagale,M. A., & Sahare, C.(2016, March). Intrusion Detection System Using Raspberry PI Honeypot in Network Security. International Journal of Engineering Science and Computing, Volume 6, No:3, DOI 10.4010/2016.651.
  • Roesch, M. (1999, November). Snort: Lightweight intrusion detection for networks. In Lisa (Vol. 99, No. 1, pp. 229-238).
  • Oktay, U., & Sahingoz, O. K. (2013, May). Proxy network intrusion detection system for cloud computing. In 2013 the international conference on technological advances in electrical, electronics and computer engineering (TAEECE) (pp. 98-104). IEEE.
  • Karahan, O., Kaya, B., 2019, September. Raspberry Pi Firewall and Intrusion Detection System. In 2019 10th International Symposium on Intelligent and Manufacturing Systems (pp. 523-529).
There are 9 citations in total.

Details

Primary Language English
Subjects Electrical Engineering
Journal Section Research Articles
Authors

Oğuzhan Karahan 0000-0003-3827-0228

Berat Kaya 0000-0002-0647-1271

Publication Date September 22, 2020
Submission Date November 30, 2019
Published in Issue Year 2020 Volume: 3 Issue: 2

Cite

APA Karahan, O., & Kaya, B. (2020). Raspberry Pi Firewall and Intrusion Detection System. Journal of Intelligent Systems: Theory and Applications, 3(2), 21-24. https://doi.org/10.38016/jista.653486
AMA Karahan O, Kaya B. Raspberry Pi Firewall and Intrusion Detection System. JISTA. September 2020;3(2):21-24. doi:10.38016/jista.653486
Chicago Karahan, Oğuzhan, and Berat Kaya. “Raspberry Pi Firewall and Intrusion Detection System”. Journal of Intelligent Systems: Theory and Applications 3, no. 2 (September 2020): 21-24. https://doi.org/10.38016/jista.653486.
EndNote Karahan O, Kaya B (September 1, 2020) Raspberry Pi Firewall and Intrusion Detection System. Journal of Intelligent Systems: Theory and Applications 3 2 21–24.
IEEE O. Karahan and B. Kaya, “Raspberry Pi Firewall and Intrusion Detection System”, JISTA, vol. 3, no. 2, pp. 21–24, 2020, doi: 10.38016/jista.653486.
ISNAD Karahan, Oğuzhan - Kaya, Berat. “Raspberry Pi Firewall and Intrusion Detection System”. Journal of Intelligent Systems: Theory and Applications 3/2 (September 2020), 21-24. https://doi.org/10.38016/jista.653486.
JAMA Karahan O, Kaya B. Raspberry Pi Firewall and Intrusion Detection System. JISTA. 2020;3:21–24.
MLA Karahan, Oğuzhan and Berat Kaya. “Raspberry Pi Firewall and Intrusion Detection System”. Journal of Intelligent Systems: Theory and Applications, vol. 3, no. 2, 2020, pp. 21-24, doi:10.38016/jista.653486.
Vancouver Karahan O, Kaya B. Raspberry Pi Firewall and Intrusion Detection System. JISTA. 2020;3(2):21-4.

Cited By

Journal of Intelligent Systems: Theory and Applications