Back
 JIS  Vol.10 No.4 , October 2019
Can Routers Provide Sufficient Protection against Cyber Security Attacks?
Abstract: Nowadays many devices that make up a computer network are being equipped with security hardware and software features to prevent cyber security attacks. The idea is to distribute security features to intermediate systems in the network to mitigate the overall adverse effect of cyber attacks. In this paper, we will be focusing on the Juniper J4350 router with the Junos Software Enhanced, and it has security-attack protections in the router. We are going to evaluate how the Juniper router with built-in security protections affected the overall server performance under a cyber security attack.
Cite this paper: Leal, D. and Kumar, S. (2019) Can Routers Provide Sufficient Protection against Cyber Security Attacks?. Journal of Information Security, 10, 302-310. doi: 10.4236/jis.2019.104017.
References

[1]   Gunnam, G. and Kumar, S. (2017) Do ICMP Security Attacks Have Same Impact on Servers? Journal of Information Security, 8, 274-283.
https://doi.org/10.4236/jis.2017.83018

[2]   Kumar, S. and Gomez, O. (2010) Denial of Service Due to Direct and Indirect Attacks in LAN Environment. Journal of Information Security, 1, 88-94.
https://doi.org/10.4236/jis.2010.12010

[3]   Kumar, S. (2006) PING Attack—How Bad Is It? Computers and Security Journal, 25, 332-337.
https://doi.org/10.1016/j.cose.2005.11.004

[4]   Sundar, K. and Kumar, S. (2016) Blue Screen of Death Observed for the Microsoft’s Server 2012 R2 under Denial of Service Attacks. Journal of Information Security, 7, 225-231.
https://doi.org/10.4236/jis.2016.74018

[5]   Kumar, S. and Gade, R. (2015) Windows 2008 vs. Windows 2003: Evaluation of Microsoft’s Windows Servers under Cyber Attacks. Journal of Information Security, 6, 155-160.

[6]   Baez Jr., R. and Kumar, S. (2014) Apple’s Lion vs. Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks. Journal of Information Security, 5, 123-135.
https://doi.org/10.4236/jis.2014.53012

[7]   Surisetty, S. and Kumar, S. (2012) Microsoft’s Windows 7 vs. Apple’s Snow Leopard: An Experimental Evaluation of Resilience against Distributed Denial of Service (DDoS) Attacks. IEEE Security and Privacy, 10, 60-64.
https://doi.org/10.1109/MSP.2011.147

[8]   Kumar, S. and Petana, E. (2008) TCP Protocol Attacks on Microsoft’s Windows XP-Based Computers. International Conference on Networking, April 2008, 238-242.

[9]   Kumar, S., Valdez, R. and Gomez, O. (2006) Survivability Evaluation of Wireless Sensor Networks under DDoS Attack. International Conference on Networking.

[10]   Kumar, S. (2005) Impact of Distributed Denial of Service (DDoS) Attack Due to ARP-Storm. The Lecture Notes in Computer Science, Springer-Verlag, Berlin.
https://doi.org/10.1007/978-3-540-31957-3_113

[11]   Surisetty, S. and Kumar, S. (2010) Is Apple’s iMac Leopard Operating System Secure under ARP-Based Flooding Attacks? International Conference on Internet Monitoring and Protection, Barcelona, 9-15 May 2010.
https://doi.org/10.1109/ICIMP.2010.30

[12]   Gade, R., Vellalacheruvu, H. and Kumar, S. (2010) Performance of Windows XP, Windows Vista and Apple’s Leopard Systems under a DDoS Attack. International Conference on Digital Society, St. Maarten, 10-16 February 2010, 188-191.
https://doi.org/10.1109/ICDS.2010.39

[13]   Kumar, S. and Sekhar, R. (2011) Experimental Evaluation of Juniper Network’s Netscreen-5GT Security Device against Layer 4 Flood Attacks. Journal of Information Security, 2, 50-58.
https://doi.org/10.4236/jis.2011.21005

[14]   Vellalacheruvu, H.K. and Kumar, S. (2011) Effectiveness of Built-In Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks. Journal of Information Security, 2, 131-138.
https://doi.org/10.4236/jis.2011.23013

[15]   Eddy, W.M. (2006) Defenses against TCP SYN Flooding Attacks. The Internet Protocol Journal, 9.
http://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-34/syn-flooding-attacks.html

[16]   Juniper Networks, Inc. (2008) Attack Detection and Defense Mechanisms.
http://www.juniper.net/techpubs/soft-ware/screenos/screenos5x/ce_v4_5_0.pdf

[17]   JUNOS® Software Security Configuration Guide.
https://www.juniper.net/documentation/software/junos-security/junos-security10.1/junos-security-swconfig-security/junos-security-swconfig-security.pdf

[18]   Security Configuration Guide for J-Series Services Routers and SRX-Series Services Gateways PDF.
http://www.juniper.net/techpubs/software/junos-es/junos-es92/junos-es-swconfig-security/junos-es-swconfig-security.pdf

[19]   JUNOS® Software J Series Services Routers Hardware Guide.
http://www.juniper.net/techpubs/hardware/junos-jseries/junos-jseries96/junos-jseries-hardware-guide/j-series-hardware-guide.pdf

[20]   Junos® OS Ethernet Interfaces Configuration Guide.
http://www.juniper.net/techpubs/en_US/junos12.3/infmation-products/topic-collections/config-guide-network-interfaces/book-config-guide-network-interfaces-ethernet.pdf

[21]   J-Series Services Router Quick Start.
http://www.juniper.net/techpubs/software/jseries/junos85/jseries85-quick-start/publications-list.html

[22]   Juniper Router Guide.
http://www.juniper.net/techpubs/software/junos-security/junos-security10.0/junos-security-admin-guide/junos-security-admin-guide-TOC.html

 
 
Top