Please use this identifier to cite or link to this item: https://ptsldigital.ukm.my/jspui/handle/123456789/395191
Title: Detecting and preventing peer-to-peer connections by Linux iptables
Authors: Mohamed Othman
Mostafa Nikpour Kermanian
Conference Name: International Symposium on Information Technology
Keywords: Linux iptables
Conference Date: 26/08/2008
Conference Location: Kuala Lumpur Convention Centre
Abstract: Most of companies use Linux iptables as their edge networks??? firewall. Although Linux iptables is a reputed secure stateful packet filter firewall package, it has some weaknesses. This package can not detect or control all peer-to-peer connections. One of the packages which is written for Linux iptables to manage peer-to-peer connections is layer 7-module. This module can not detect all peer-to-peer connections and drop them. Some peer-to-peer connections which use HTTP port for connecting to other peers are detected with this netfilter's patch-o-matic but those which use static ports or dynamic ports for connecting to peers can not be detected with this module. For controlling peer-to-peer connections investigator blocked some peer-to-peer well known static ports with Linux iptables and then, for increasing the control of other peer-to-peer applications which used dynamic ports, he used QOS rules. Although this trend could drop most of peer-to-peer connections and save internet bandwidth, it was not the complete solution. He decided to control peer-to-peer connections by implementing a new module which checks peer-to-peer payloads in his next investigation.
Pages: 6
Call Number: T58.5.C634 2008 kat sem j.4
Publisher: Institute of Electrical and Electronics Engineers (IEEE),Piscataway, US
Appears in Collections:Seminar Papers/ Proceedings / Kertas Kerja Seminar/ Prosiding

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.