Please use this identifier to cite or link to this item:
https://ptsldigital.ukm.my/jspui/handle/123456789/395191
Title: | Detecting and preventing peer-to-peer connections by Linux iptables |
Authors: | Mohamed Othman Mostafa Nikpour Kermanian |
Conference Name: | International Symposium on Information Technology |
Keywords: | Linux iptables |
Conference Date: | 26/08/2008 |
Conference Location: | Kuala Lumpur Convention Centre |
Abstract: | Most of companies use Linux iptables as their edge networks??? firewall. Although Linux iptables is a reputed secure stateful packet filter firewall package, it has some weaknesses. This package can not detect or control all peer-to-peer connections. One of the packages which is written for Linux iptables to manage peer-to-peer connections is layer 7-module. This module can not detect all peer-to-peer connections and drop them. Some peer-to-peer connections which use HTTP port for connecting to other peers are detected with this netfilter's patch-o-matic but those which use static ports or dynamic ports for connecting to peers can not be detected with this module. For controlling peer-to-peer connections investigator blocked some peer-to-peer well known static ports with Linux iptables and then, for increasing the control of other peer-to-peer applications which used dynamic ports, he used QOS rules. Although this trend could drop most of peer-to-peer connections and save internet bandwidth, it was not the complete solution. He decided to control peer-to-peer connections by implementing a new module which checks peer-to-peer payloads in his next investigation. |
Pages: | 6 |
Call Number: | T58.5.C634 2008 kat sem j.4 |
Publisher: | Institute of Electrical and Electronics Engineers (IEEE),Piscataway, US |
Appears in Collections: | Seminar Papers/ Proceedings / Kertas Kerja Seminar/ Prosiding |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.