Araştırma Makalesi
BibTex RIS Kaynak Göster

Raspberry Pi ile Güvenlik Duvarı ve Saldırı Tespit Sistemi

Yıl 2020, Cilt: 3 Sayı: 2, 21 - 24, 22.09.2020
https://doi.org/10.38016/jista.653486

Öz

Bilgi, işletmeler için en temel yapıtaşıdır. Bu nedenle bilgi üzerinde yeterli kontrol sahibi olmak vazgeçilmezdir. Bu kontrol, bir şirket için daha iyi güvenlik ve genel yönetim sağlar. Bu güvenliği sağlamanın yolu bütün ağı denetlecek bir güvenlik duvarı kurmaktır. Güvenlik duvarı şirketlerin ağları üzerindeki cihazları ve bilgisayarları diğer ağlar üzerinden gelecek saldırılara karşı koruyan, iç ve dış ağlar arası ağ trafiğini belirli kurallara göre denetleyen bir güvenlik mekanizmasıdır. Güvenlik duvarı üzerinde belirtilmiş kurallara uymayan trafik engelleyerek koruma sağlanır. Bu çalışmada düşük maliyetli cep bilgisayarı Raspberry Pi ve ağ anahtarı kullanılarak küçük veya orta ölçekli bir işyeri ağı modellemesi üzerinde güvenlik duvarı ve saldırı tespit sistemi yapılmıştır. Bu ağa bağlı bilgisayarlara Raspberry Pi üzerinden internet erişimi sağlanmıştır. Ağdaki bilgisayarlara yapılan ataklar Raspberry Pi üzerinden gözlemlenmiştir ve yazılan kurallar sayesinde kolayca engellenmiştir.

Kaynakça

  • Bellovin, S. M., & Cheswick, W. R. (1994). Network firewalls. IEEE communications magazine, 32(9), 50-57.
  • Ashoor, A. S., & Gore, S. (2011). What is the difference between Hackers and Intruders. Int. J. Sci. Eng. Res, 2(7), 1-3.
  • Lalitha, M., Meachery, N., & Nair, R. (2018). Raspberry PI Based Cyber-Defensive Industrial Control SystemWith Redundancy And Intrusion Detection. International Journal of Pure and Applied Mathematics, 118(20), 4273-4278.
  • Coşar, M., & Kiran, H. E. (2018, May). Measurement of Raspberry Pi performance in network traffic analysis. In 2018 26th Signal Processing and Communications Applications Conference (SIU) (pp. 1-4). IEEE.
  • Coşar, M., & Karasartova, S. (2017, October). A firewall application on SOHO networks with Raspberry Pi and snort. In 2017 International Conference on Computer Science and Engineering (UBMK) (pp. 1000-1003). IEEE.
  • Mahajan, S., Adagale,M. A., & Sahare, C.(2016, March). Intrusion Detection System Using Raspberry PI Honeypot in Network Security. International Journal of Engineering Science and Computing, Volume 6, No:3, DOI 10.4010/2016.651.
  • Roesch, M. (1999, November). Snort: Lightweight intrusion detection for networks. In Lisa (Vol. 99, No. 1, pp. 229-238).
  • Oktay, U., & Sahingoz, O. K. (2013, May). Proxy network intrusion detection system for cloud computing. In 2013 the international conference on technological advances in electrical, electronics and computer engineering (TAEECE) (pp. 98-104). IEEE.
  • Karahan, O., Kaya, B., 2019, September. Raspberry Pi Firewall and Intrusion Detection System. In 2019 10th International Symposium on Intelligent and Manufacturing Systems (pp. 523-529).

Raspberry Pi Firewall and Intrusion Detection System

Yıl 2020, Cilt: 3 Sayı: 2, 21 - 24, 22.09.2020
https://doi.org/10.38016/jista.653486

Öz

Information is the most essential building block to businesses, thus having adequate control over it is indispensability for most. Such control allows for better security and overall administration for a company. The existing solution is to install a firewall to the root switch, enabling admins to manage traffic by interfacing with the firewall equipment. This paper proposes a light-weight and highly configurable firewall solution for small to mid-range businesses. Built on a Raspberry Pi, including a user-friendly interface, with little information individuals will able to configure and install the firewall to their businesses. The proper solution will enable high-level control over the desired ports and user groups. Access to potentially harmful information can effortlessly be moderated and blocked if necessary.

Kaynakça

  • Bellovin, S. M., & Cheswick, W. R. (1994). Network firewalls. IEEE communications magazine, 32(9), 50-57.
  • Ashoor, A. S., & Gore, S. (2011). What is the difference between Hackers and Intruders. Int. J. Sci. Eng. Res, 2(7), 1-3.
  • Lalitha, M., Meachery, N., & Nair, R. (2018). Raspberry PI Based Cyber-Defensive Industrial Control SystemWith Redundancy And Intrusion Detection. International Journal of Pure and Applied Mathematics, 118(20), 4273-4278.
  • Coşar, M., & Kiran, H. E. (2018, May). Measurement of Raspberry Pi performance in network traffic analysis. In 2018 26th Signal Processing and Communications Applications Conference (SIU) (pp. 1-4). IEEE.
  • Coşar, M., & Karasartova, S. (2017, October). A firewall application on SOHO networks with Raspberry Pi and snort. In 2017 International Conference on Computer Science and Engineering (UBMK) (pp. 1000-1003). IEEE.
  • Mahajan, S., Adagale,M. A., & Sahare, C.(2016, March). Intrusion Detection System Using Raspberry PI Honeypot in Network Security. International Journal of Engineering Science and Computing, Volume 6, No:3, DOI 10.4010/2016.651.
  • Roesch, M. (1999, November). Snort: Lightweight intrusion detection for networks. In Lisa (Vol. 99, No. 1, pp. 229-238).
  • Oktay, U., & Sahingoz, O. K. (2013, May). Proxy network intrusion detection system for cloud computing. In 2013 the international conference on technological advances in electrical, electronics and computer engineering (TAEECE) (pp. 98-104). IEEE.
  • Karahan, O., Kaya, B., 2019, September. Raspberry Pi Firewall and Intrusion Detection System. In 2019 10th International Symposium on Intelligent and Manufacturing Systems (pp. 523-529).
Toplam 9 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Elektrik Mühendisliği
Bölüm Araştırma Makalesi
Yazarlar

Oğuzhan Karahan 0000-0003-3827-0228

Berat Kaya 0000-0002-0647-1271

Yayımlanma Tarihi 22 Eylül 2020
Gönderilme Tarihi 30 Kasım 2019
Yayımlandığı Sayı Yıl 2020 Cilt: 3 Sayı: 2

Kaynak Göster

APA Karahan, O., & Kaya, B. (2020). Raspberry Pi Firewall and Intrusion Detection System. Journal of Intelligent Systems: Theory and Applications, 3(2), 21-24. https://doi.org/10.38016/jista.653486
AMA Karahan O, Kaya B. Raspberry Pi Firewall and Intrusion Detection System. jista. Eylül 2020;3(2):21-24. doi:10.38016/jista.653486
Chicago Karahan, Oğuzhan, ve Berat Kaya. “Raspberry Pi Firewall and Intrusion Detection System”. Journal of Intelligent Systems: Theory and Applications 3, sy. 2 (Eylül 2020): 21-24. https://doi.org/10.38016/jista.653486.
EndNote Karahan O, Kaya B (01 Eylül 2020) Raspberry Pi Firewall and Intrusion Detection System. Journal of Intelligent Systems: Theory and Applications 3 2 21–24.
IEEE O. Karahan ve B. Kaya, “Raspberry Pi Firewall and Intrusion Detection System”, jista, c. 3, sy. 2, ss. 21–24, 2020, doi: 10.38016/jista.653486.
ISNAD Karahan, Oğuzhan - Kaya, Berat. “Raspberry Pi Firewall and Intrusion Detection System”. Journal of Intelligent Systems: Theory and Applications 3/2 (Eylül 2020), 21-24. https://doi.org/10.38016/jista.653486.
JAMA Karahan O, Kaya B. Raspberry Pi Firewall and Intrusion Detection System. jista. 2020;3:21–24.
MLA Karahan, Oğuzhan ve Berat Kaya. “Raspberry Pi Firewall and Intrusion Detection System”. Journal of Intelligent Systems: Theory and Applications, c. 3, sy. 2, 2020, ss. 21-24, doi:10.38016/jista.653486.
Vancouver Karahan O, Kaya B. Raspberry Pi Firewall and Intrusion Detection System. jista. 2020;3(2):21-4.

Zeki Sistemler Teori ve Uygulamaları Dergisi