1. bookVolume 33 (2015): Issue 1 (September 2015)
Journal Details
License
Format
Journal
eISSN
2083-4608
First Published
26 Feb 2008
Publication timeframe
4 times per year
Languages
English
access type Open Access

Analysis of Network Traffic Filtering / Analiza Filtracji Ruchu Sieciowego

Published Online: 04 Dec 2015
Volume & Issue: Volume 33 (2015) - Issue 1 (September 2015)
Page range: 41 - 60
Journal Details
License
Format
Journal
eISSN
2083-4608
First Published
26 Feb 2008
Publication timeframe
4 times per year
Languages
English
Abstract

The article consist of study on concept of Network Obstacle (firewall, FW) using PLD-Linux platform and available tools, implementation selected mechanism of security, also analysis the effectiveness of prepared Network Obstacle. Study on concept of Network Obstacle is based on Screened Subnet architecture. Testing effectiveness of network Obstacle was found in two fundamental parts. In the first part was examining the security of network obstacle, testing the resistance attempts of scanning port and the most common attacks. The second part of the research meant to show the influence of the Network Obstacle on time and delay of the realization of transaction for HTTP movement depending on level of the security and movement intensity generated by internal network users. Testing the effectiveness of FW was verify by testing the resistance in an attempt of scanning ports and attacks refusal of service (ICMP, SYN Flood), providing base of dispersed attacks DDoS. This part of the research had one aim, to show the influence FW on time and on delay of the realization the transaction for motion HTTP, depending on the security level and intensity of movement generated by the users of the internal network.

Keywords

Słowa kluczowe

[1] Laskowski D., Lubkowski, P.: Confidential transportation of data on the technical state of facilities, Advances in Intelligent Systems and Computing 286, pp. 313-324, 2014.10.1007/978-3-319-07013-1_30Search in Google Scholar

[2] Bajda, A., Laskowski, D., Wrazen M.: Diagnostics the quality of data transfer in the management of crisis situation, Przeglad Elektrotechniczny 87 (9 A), pp. 72-78, 2011.Search in Google Scholar

[3] Bergier B. „Bezpieczeństwo i ochrona danych w sieciach komputerowych opartych o system GNU/LINUX” - praca dyplomowa, 2003.Search in Google Scholar

[4] Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman: Building Internet Firewalls - 2nd Edition, 2000.Search in Google Scholar

[5] Gouda M. G., Xiang-Yang A. Liu: Firewall Design: Consistency, Completeness and Compactness”, IEEE, 2004.10.1109/ICDCS.2004.1281597Search in Google Scholar

[6] Benjamin H.:CCIE Security, Wydawnictwo MIKOM, Warszawa 2004.Search in Google Scholar

[7] Strony WWW: http://www.infosecwriters.com, http://www.pld-linux.org, http://www.openvpn.net, http://www.privoxy.org, http://www.ipsechowto.org/ipsec-howto.pdf, http://www.iptables.org, http://httpd.apache.org, dostępne IX-X. 2012r.Search in Google Scholar

[8] Lubkowski P., Laskowski D.: The end-to-end rate adaptation application for real-time video monitoring, Advances in Intelligent Systems and Computing 224, pp. 295-305, 2013.10.1007/978-3-319-00945-2_26Search in Google Scholar

[9] Lubkowski P., Laskowski D., Pawlak E. Provision of the reliable video surveillance services in heterogeneous networks, Safety and Reliability: Methodology and Appli-cations - Proceedings of the European Safety and Reliability Conference, ESREL 2014 pp. 883-888, 2015.Search in Google Scholar

[10] Lubkowski P., Laskowski D.: Test of the multimedia services implementation in in-formation and communication networks, Advances in Intelligent Systems and Computing 286, pp. 325-332, 2014.10.1007/978-3-319-07013-1_31Search in Google Scholar

[11] Serafin M.: Sieci VPN - Zdalna praca i bezpieczeństwo danych, Helion, 2008.Search in Google Scholar

[12] Shimorski J. R., Shinder Littlejohn D., Shinder W. Thomas - „Wielka Księga Firewalli”, HELION, Warszawa 2004.Search in Google Scholar

[13] Zalecenia IETF: RFC-3193 „Securing L2TP using IPSec”, RFC-3511 “Benchmarking Methodology for Firewall Performance”, 2003.Search in Google Scholar

[14] Laskowski D., Lubkowski P., Pawlak E., Stańczyk P.: Anthropo-technical systems reliability, Safety and Reliability: Methodology and Applications - Proceedings of the European Safety and Reliability Conference, ESREL 2014, pp. 399-407, 2015.Search in Google Scholar

[15] Lubkowski P., Laskowski D.: The selected issues of reliable identification of object in transport systems using video monitoring services, Communication in Computer and Information Science 0471, pp. 59-68, 2014.10.1007/978-3-662-45317-9_7Search in Google Scholar

[16] Laskowski D., Lubkowski P., Kwasniewski M.: Identification of suitability services for wireless networks, Przeglad Elektrotechniczny 89 (9), pp. 128-132, 2013.Search in Google Scholar

[17] Bylak M., Laskowski D.: Assessment of network coding mechanism for the network protocol stack 802.15.4/6LoWPAN, Advances in Intelligent Systems and Computing 224, pp. 75-82, 2013.10.1007/978-3-319-00945-2_7Search in Google Scholar

[18] Bylak M., Laskowski D.: Diagnosis coding efficiency of network coding mechanism for wireless networks, Przeglad Elektrotechniczny 89 (9), pp. 133-138, 2013. Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo