Treffer: A simulation-based approach toward detection and mitigation of flood attacks.
Weitere Informationen
Considering the significant rise in cyberthreats in recent years, it is imperative that network infrastructure security be emphasized. Using a firewall system, this paper outlines a comprehensive approach to virtual network security. The very first step in the project was to set up a dual-boot environment using Ubuntu and Windows. VirtualBox is utilized to add a Kali Linux virtual computer to the Ubuntu environment. This is a project aimed at emulating, detecting, and mitigating common cyber-attacks coming from the Kali Linux virtual machine to the Ubuntu operating system, especially those coming in through TCP, UDP, and ping floods. These attacks, made using the command line on the IP address of the Ubuntu machine, provide the basis for the tests done on defenses. At the same time, there is a detection and mitigation code running in the Ubuntu application, which is developed on Python. This application listens to continuous packet traffic entering it, through Scapy along with other Python functions, and once it observes suspicious behavior, it blocks the attacker's IP by noticing the characteristics of the various types of flood attacks and comparing those with the predefined thresholds. This study has simulated cyber-attacks along with real-world defense measures that give it a holistic approach. Cyber-attacks are of evolving nature, hence proactive security is necessary to maintain the integrity of a network. [ABSTRACT FROM AUTHOR]
Copyright of AIP Conference Proceedings is the property of American Institute of Physics and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)