{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T06:10:28Z","timestamp":1651903828721},"reference-count":24,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>With the steady advancements in the technology, the network security is really important these days to protect information from attackers. In this research, the main focus is on designing strong firewall filtering rules so that detection of malicious code is achieved to an optimal level. A proposed framework is introduced to improve the performance parameters such as Server response time, Web content analysis, Bandwidth, and the performance of the Network traffic load. This research work defines a new set of IPtable rules achieved by modifying the kernel source code. This is done using OpenBSD kernel source code, which results in the formation of a mini-firewall. Therefore, a new hybrid approach is proposed by adding packet filtering rules and SNORT technology in mini-firewall for malicious activity detection. It is an efficient and practical technique which will be helpful to mitigate the malware attacks and secure LAMP server. Experimental analysis has been done to conclude that around 70-75% malicious activity can be reduced by using the proposed technique.<\/jats:p>","DOI":"10.4018\/ijossp.2018010103","type":"journal-article","created":{"date-parts":[[2018,5,30]],"date-time":"2018-05-30T11:53:53Z","timestamp":1527681233000},"page":"32-61","source":"Crossref","is-referenced-by-count":1,"title":["An Approach to Mitigate Malware Attacks Using Netfilter's Hybrid Frame in Firewall Security"],"prefix":"10.4018","volume":"9","author":[{"given":"Nivedita","family":"Nahar","sequence":"first","affiliation":[{"name":"National Institute of Technical Teachers Training and Research, Chandigarh, India"}]},{"given":"Prerna","family":"Dewan","sequence":"additional","affiliation":[{"name":"National Institute of Technical Teachers Training and Research, Panchkula, India"}]},{"given":"Rakesh","family":"Kumar","sequence":"additional","affiliation":[{"name":"National Institute of Technical Teachers Training and Research, Chandigarh, India"}]}],"member":"2432","reference":[{"key":"IJOSSP.2018010103-0","unstructured":"Aliyev, R., Seo, D., & Lee, H. (2013). DROP-FAST: Defending against DDoS Attacks using Cloud Technology. In International Conference on Security and Management (pp. 1\u20137)."},{"key":"IJOSSP.2018010103-1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2008.020090"},{"key":"IJOSSP.2018010103-2","doi-asserted-by":"crossref","unstructured":"Cronin, B. & Wang, X. (2013). Pattern overlap in bit-parallel implementation of regular expression repetition quantifiers. International journal of Security and Networks, 8(4), 231-238.","DOI":"10.1504\/IJSN.2013.058154"},{"key":"IJOSSP.2018010103-3","unstructured":"Cyberciti. (n.d.). Configuration of firewall. Retrieved from https:\/\/www.cyberciti.biz\/faq\/howto-configure-setup-firewall-with-ufw-on-ubuntu-linux\/"},{"key":"IJOSSP.2018010103-4","unstructured":"Damri, G., & Vidyarthi, D. (2016). Automatic Dynamic Malware Analysis Techniques for Linux Environment. IEEE International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 825-830)."},{"key":"IJOSSP.2018010103-5","doi-asserted-by":"crossref","unstructured":"Ehlert, S., Rebahi, Y. & Magedanz, T. (2009). Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks. International journal of Security and Networks, 4(3), pp.189\u2013200.","DOI":"10.1504\/IJSN.2009.027344"},{"key":"IJOSSP.2018010103-6","unstructured":"Globo. (n.d.). Linux Firewall Introduction. Retrieved from https:\/\/www.globo.tech\/learning-center\/linux-firewall-introduction"},{"key":"IJOSSP.2018010103-7","unstructured":"How to ubuntu. (n.d.). How to install lamp on Ubuntu. Retrieved from http:\/\/howtoubuntu.org\/how-to-install-lamp-on-ubuntu"},{"key":"IJOSSP.2018010103-8","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.644-650.3283"},{"issue":"1","key":"IJOSSP.2018010103-9","first-page":"171","article-title":"Adaptive Packet Filtering Techniques for Linux Firewall. International Journal of Advance Research","volume":"3","author":"P. S.Kadam","year":"2017","journal-title":"Ideas and Innovations in Technology"},{"key":"IJOSSP.2018010103-10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2012.342"},{"key":"IJOSSP.2018010103-11","doi-asserted-by":"crossref","unstructured":"Lee, I. & Hunt, R. (2008). A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks. International Journal of Internet Protocol Technology, 3(2), 128\u2013135.","DOI":"10.1504\/IJIPT.2008.020470"},{"key":"IJOSSP.2018010103-12","doi-asserted-by":"crossref","unstructured":"Mao, H. (2012). Current State and Future Development Trend of Firewall Technology. In 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (pp. 1\u20133).","DOI":"10.1109\/WiCOM.2012.6478472"},{"key":"IJOSSP.2018010103-13","doi-asserted-by":"publisher","DOI":"10.1109\/WiCOM.2012.6478472"},{"issue":"4","key":"IJOSSP.2018010103-14","first-page":"141","article-title":"International Journal of Advanced Research in Computer Science and Software Engineering.","volume":"3","author":"K.Mindo","year":"2016","journal-title":"International Journal of Advance Research in Computer Science and Software Engineering"},{"issue":"7","key":"IJOSSP.2018010103-15","first-page":"2512","article-title":"Defending HTTP Web Servers against DDoS Attacks through Busy Period-based Attack Flow Detection.","volume":"8","author":"S. Y.Nam","year":"2014","journal-title":"Transactions on Internet and Information Systems (Seoul)"},{"key":"IJOSSP.2018010103-16","unstructured":"Nmap. (n.d.). Nmap security scanner tool. Retrieved from https:\/\/nmap.org\/"},{"issue":"36","key":"IJOSSP.2018010103-17","first-page":"7744","article-title":"Design of a Firewall Based on Linux Netfilter using ARM9.","volume":"4","author":"J.Phalguni","year":"2015","journal-title":"International Journal of Scientific Engineering and Technology Research"},{"issue":"1-2","key":"IJOSSP.2018010103-18","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1504\/IJIPT.2010.032612","article-title":"Discovering last-matching rules in popular open-source and commercial firewalls.","volume":"5","author":"K.Salah","year":"2010","journal-title":"International Journal of Internet Protocol Technology"},{"key":"IJOSSP.2018010103-19","doi-asserted-by":"crossref","unstructured":"Springs, C. (2008). Syntax vs. semantics: competing approaches to dynamic network intrusion detection Walter Scheirer Mooi Choo Chuah. International journal of Security and Networks, 3(1), 24-35.","DOI":"10.1504\/IJSN.2008.016199"},{"key":"IJOSSP.2018010103-20","first-page":"504","article-title":"High Security Firewall: Prevent Unauthorized Access Using Firewall Technologies.","volume":"6","author":"S. C.Tharaka","year":"2016","journal-title":"International Journal of Scientific and Research Publications"},{"issue":"4","key":"IJOSSP.2018010103-21","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MSP.2015.86","article-title":"Packet Inspection for Unauthorized OS Detection in Enterprises.","volume":"13","author":"R.Tyagi","year":"2015","journal-title":"IEEE Security and Privacy"},{"key":"IJOSSP.2018010103-22","doi-asserted-by":"crossref","unstructured":"Wang, B., Lu, K., & Chang, P. (2016). Design and Implementation of Linux Firewall Based on the Frame of Netfilter \/ IPtable. The 11th International Conference on Computer Science & Education (ICCSE2016) (pp. 949-953).","DOI":"10.1109\/ICCSE.2016.7581711"},{"key":"IJOSSP.2018010103-23","unstructured":"Welivesecurity. (n.d.). The 10 biggest security incidents of 2017. Retrieved from https:\/\/www.welivesecurity.com\/2016\/12\/30\/biggest-security-incidents-2017\/"}],"container-title":["International Journal of Open Source Software and Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=206886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T14:02:55Z","timestamp":1651845775000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJOSSP.2018010103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":24,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijossp.2018010103","relation":{},"ISSN":["1942-3926","1942-3934"],"issn-type":[{"value":"1942-3926","type":"print"},{"value":"1942-3934","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]}}}