REVEALING ANOMALIES BY NETWORK PACKET FLOODING ON BUILT FTP AND OPENSSH SERVERS IN CONTROLLED LAB ENVIRONMENT

REVEALING ANOMALIES BY NETWORK PACKET FLOODING ON BUILT FTP AND OPENSSH SERVERS IN CONTROLLED LAB ENVIRONMENT

Authors

  • Petar Boyanov Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

DOI:

https://doi.org/10.46687/jsar.v27i1.414

Keywords:

Anomaly, DoS, DDoS, Detection, Flooding, FTP, OpenSSH, Packet, Privacy, Protocol, Revealing, Server, SSH

Abstract

This scientific paper investigates the effects of network packet flooding on FTP (port 21) and SSH (port 22) protocols, aiming to reveal and document anomalies in server behavior under high-load conditions. By simulating packet flooding in a controlled lab environment, an analysis on vulnerabilities and anomalies unique to each protocol is conducted in order to the improve defensive capabilities. The results provide guidance on best practices to secure FTP and OpenSSH services against malicious traffic, such as Distributed Denial of Service (DDoS) attacks, supporting wider network security strategies.

Author Biography

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria, e-mail: petar.boyanov@shu.bg, ORCID iD icon https://orcid.org/0000-0003-3668-6713

References

Ahda, A., Wulandari, C., Husellvi, H. P., Alhuda, M. Y., Reda, M., Zahwa, P., & Ananda, S. (2023). Information security implementation of DDoS attack using hping3 tools. JComce-Journal of Computer Science, 1(4).

Ajayan, A. C., Prabaharan, P., Krishnan, M. R., & Pal, S. (2016, September). Hiper-ping: Data plane based high performance packet generation bypassing kernel on× 86 based commodity systems. In 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 478-483). IEEE.

Bawany, N. Z., Shamsi, J. A., & Salah, K. (2017). DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arabian Journal for Science and Engineering, 42, 425-441.

Bedzhev, B., Trıfonov, T., & Nıkolov, N. (2010). A multicore computer system for design of stream ciphers based on random feedback shift registers. İstanbul Aydın Üniversitesi Dergisi, Turkey, 2(7), 1-15., https://dergipark.org.tr/en/download/article-file/319309. [Last accessed on 25 September 2024]

Boyanov, P., Using modified sniffer scripts, implementing linear algorithms for detection of network port scan attacks in Linux based operating systems. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 24, Shumen, 2023, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 78-88, DOI: https://doi.org/10.46687/jsar.v24i1.371.

Boyanov, P., Investigating the network traffic using the command-line packets sniffer Tcpdump in Kali Linux. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 25, Shumen, 2023, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 31-44, DOI: https://doi.org/10.46687/jsar.v25i1.378.

Douligeris, C., & Mitrokotsa, A. (2004). DDoS attacks and defense mechanisms: classification and state-of-the-art. Computer networks, 44(5), 643-666.

Ghanti, S. R., & Naik, G. M. (2015). Design of system on chip for generating syn flood attack to test the performance of the security system.

Gueorguiev N.L., Nesterov K.N., Minev S., An approach to information exchange management in multimodule multi-position security systems. International Scientific Journal "Security & Future", Vol. 6, Issue 1, pp: 28-31, STUME, 2022, WEB ISSN 2535-082X; PRINT ISSN 2535-0668,https://stumejournals.com/journals/confsec/2022/1/28.full.pdf. [Last accessed on 21 September 2024]

Happe, Andreas, and Jürgen Cito. "Understanding Hackers’ Work: An Empirical Study of Offensive Security Practitioners." In Proceedings of ESEC/FSE '23: San Francisco CA USA December 3-9, publisher: Association for Computing Machinery, New York, NY, United States, 2023, pp. 1669-1680. 2023, ISBN: 979-8-4007-0327-0, https://doi.org/10.

/3611643.3613900.

Haniyah, W., Hidayat, M. C., Putra, Z. F. I., Pertama, V. A., & Setiawan, A. (2024). A Simulasi Serangan Denial of Service (DoS) menggunakan Hping3 melalui Kali Linux. Journal of Internet and Software Engineering, 1(2), 8-8.

Hoque, N., Bhattacharyya, D. K., & Kalita, J. K. (2015). Botnet in DDoS attacks: trends and challenges. IEEE Communications Surveys & Tutorials, 17(4), 2242-2270.

Iliev, R., K. Ignatova. Cloud technologies for building data center system for defense and security. T. Tagarev et al. (eds.), Digital Transformation, Cyber Security and Resilience of Modern Societies, Studies in Big Data 84, ISBN 978-3-030-65721-5, Springer 2020, pp.13-24,https://doi.org/10.1007/

-3-030-65722-2.

Iliev, R., Kochankov, M., A Generalized Net Model of Command and Control System. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 127-131, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol2.8035.

Ivanov, I., & Aleksandrova, K. (2024, June). Design and Implementation of Software-Defined Doppler Radar. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume III, pp. 105-108, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol3.8159.

Islam, M. M., Shahid, S., Awar, K. B., Khan, R., & Sohail, M. (2021). Cyber-Security: Dos Attack Outcomes are Dangerous. European Journal of Electrical Engineering and Computer Science, 5(3), 54-59.

Kamerling, E. J. (2012). The Hping2 Idle Host Scan.

Khare, N., & Bhutad, S. (2023, October). Intrusion Detection System for Live Anomaly-Based Network Packets. In 2023 IEEE International Carnahan Conference on Security Technology (ICCST) (pp. 1-6). IEEE.

Kochankov, M., & Iliev, R. (2024, June). A Generalized Net Model for Accessing Information Resources in a Secure Environment. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 175-178, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/

etr2024vol2.8034.

Kolev, Alexander, Nikolova, Pavlina. Instrumental Equipment for Cyberattack Prevention. Information & Security: An International Journal 47, no. 3 (2020):285-299. https://doi.org/10.11610/isij.4720.

Kumari, P., & Jain, A. K. (2023). A comprehensive study of DDoS attacks over IoT network and their countermeasures. Computers & Security, 127, 103096.

Lee, K., Kim, J., Kwon, K. H., Han, Y., & Kim, S. (2008). DDoS attack detection method using cluster analysis. Expert systems with applications, 34(3), 1659-1665.

Liang, L., Zheng, K., Sheng, Q., & Huang, X. (2016, December). A denial of service attack method for an iot system. In 2016 8th international conference on Information Technology in Medicine and Education (ITME) (pp. 360-364). IEEE.

Liu, R. (2023, October). Study limitations of DoS attackers due to computer resources. In Third International Conference on Signal Image Processing and Communication (ICSIPC 2023) (Vol. 12916, pp. 447-451). SPIE.

Mirkovic, J., Prier, G., & Reiher, P. (2002, November). Attacking DDoS at the source. In 10th IEEE International Conference on Network Protocols, 2002. Proceedings. (pp. 312-321), IEEE.

Mirtcheva-Ivanova, Daniela, Application of electronic platforms to increase the knowledge of learners. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 448-452, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol2.8090.

Mirtcheva-Ivanova, D., Application of Artificial Intelligence in E-Learning. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 208-211, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol2.8053.

Nazario, J. (2008). DDoS attack evolution. Network Security, 2008(7), 7-10.

Nedyalkov, I., & Georgiev, G. Kali Linux - a simple and effective way to study the level of cyber security and penetration testing of power electronic devices, International Journal on Information Technologies & Security, 16(2):103-114, 2024, doi:10.59035/JMFY4876.

Osanaiye, O., Choo, K. K. R., & Dlodlo, M. (2016). Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. Journal of Network and Computer Applications, 67, 147-165.

Pavlov, G., Kolev. Al., A place of GIS technologies in information Systems for crisis prevention, 6th International Conference on Application of Information and Communication Technology and Statistics In Economy and Education (ICAICTSEE – 2016), December 2-3rd, 2016, UNWE, Sofia, Bulgaria, ISSN 2367-7635 (print), ISSN 2367-7643 (online), pp. 452-457.

Peng, T., Leckie, C., & Ramamohanarao, K. (2007). Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys (CSUR), 39(1), 3-es.

Qureshi, M. A., Ahmed, S., Mehmood, A., Shaheen, R., & Dildar, M. S. (2024). Vulnerability assessment of operating systems in healthcare: exploitation implications techniques and security. Health Sciences Journal, 2(2), 104-111, ISSN (Online): 2959-2259, ISSN (Print): 2959-2240, https://doi.org/10.59365/hsj.2(2).2024.98.

Rao, G. S., & Subbarao, P. K. (2024). Exploring a novel framework for DOS/DDOS attack detection and simulation in contemporary networks. i-manager's Journal on Software Engineering, 18(3).

Servanda, Y. (2024). Analisis Serangan Forensik Terhadap Serangan Ddos Ping of Death Menggunakan Tools NMAP dan HPING3. Jurnal Sains dan Teknologi (JSIT), 4(2), 209-216.

Singh, N., Sharma, D., & Rawat, V. (2023, April). Evaluation of the efficiency of honeypots in opposing flooding attack. In 2023 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES) (pp. 365-370). IEEE.

Tampati, I. F., Setyawan, F. G., Sejati, W. W., & Kardian, A. R. Comparative analysis of CPU performance on freebsd 64-bit and redhat 64-bit operating system against denial of service (DoS) using hping3. CESS (Journal of Computer Engineering, System and Science), 8(1), 209-219.

Trifonov T., 2019, Modeling and Calculation of Passive Audio Crossovers, Annual of Konstantin Preslavsky University of Shumen, Vol IX E Technical Sciences, ISSN 1311-834X, pp. 182-189.

Trifonov, T., Performance analysis of a mobile computer equipped with solid state disk. Annual of Konstantin Preslavsky University of Shumen, Shumen, Konstantin Preslavsky University Press, ISSN 1311-834X, Vol. IV E, 2014, pp. 27–42.

Vuletić, D. V., & Nojković, N. D. (2018). Realization of A TCP Syn Flood Attack using Kali Linux. Vojnotehnicki glasnik/Military Technical Courier, 66(3), 640-649.

Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE communications surveys & tutorials, 15(4), 2046-2069.

Downloads

Published

13.11.2024

How to Cite

Boyanov, P. (2024). REVEALING ANOMALIES BY NETWORK PACKET FLOODING ON BUILT FTP AND OPENSSH SERVERS IN CONTROLLED LAB ENVIRONMENT: REVEALING ANOMALIES BY NETWORK PACKET FLOODING ON BUILT FTP AND OPENSSH SERVERS IN CONTROLLED LAB ENVIRONMENT. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 27(1), 138–156. https://doi.org/10.46687/jsar.v27i1.414

Issue

Section

Communication and computer technologies

Categories

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 > >>