⚠ Official Notice: www.ijisrt.com is the official website of the International Journal of Innovative Science and Research Technology (IJISRT) Journal for research paper submission and publication. Please beware of fake or duplicate websites using the IJISRT name.



Cyber Attack Simulation and Detection in a Segmented WAN–LAN–DMZ Network


Authors : S. Sangamithra; Ajaay Pranav O. B.; Bharath J. B.; Sanjeevi K. S.

Volume/Issue : Volume 11 - 2026, Issue 3 - March


Google Scholar : https://tinyurl.com/399vn37c

Scribd : https://tinyurl.com/43z6t8wm

DOI : https://doi.org/10.38124/ijisrt/26mar1610

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : The growing complexity of cyber threats has revealed critical limitations in traditional network security mechanisms. This paper presents a framework for simulating and detecting cyber-attacks using a segmented WAN DMZ LAN architecture. A virtual environment is developed with a vulnerable DMZ server and protected LAN system. A pfSense firewall and Suricata IDS are used to monitor and detect attacks. Results show improved detection and isolation of threats using segmentation and monitoring.

Keywords : Network Security, DMZ, Firewall, IDS, Cyber Attack Simulation, pfsense, Suricata.

References :

  1. “Survey on Intrusion Detection Systems in Software- Defined Networking,” 2025.
  2. L. Diana, P. Dini, and D. Paolini, "Overview on Intrusion Detection Systems for Computer Network Security", 2025.
  3. W. Stallings, Network Security Essentials: Applications and Standards, 6th ed., Pearson Education, 2017.
  4. A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection," SIAM International Conference on Data Mining, 2003, pp. 25–36, doi: 10.1137/1.9781611972733.3.
  5. R. Sommer and V. Paxson, "Outside the Closed World: On Using Machine Learning for Network Intrusion Detection," IEEE Symposium on Security and Privacy, 2010, pp. 305–316, doi: 10.1109/SP.2010.25.
  6. S. Axelsson, "Intrusion Detection Systems: A Survey and Taxonomy," Technical Report No. 99-15, Chalmers University, 2000.
  7. S. Kumar and E. H. Spafford, "A Pattern Matching Model for Misuse Intrusion Detection," Proceedings of the 17th National Computer Security Conference, 1994.
  8. J. Zhang, M. Zulkernine, and A. Haque, "Random-Forests-Based Network Intrusion Detection Systems," IEEE Transactions on Systems, Man, and Cybernetics, vol. 38, no. 5, pp. 649–659, 2008, doi: 10.1109/TSMCB.2008.2001303.
  9. Digininja, "Damn Vulnerable Web Application (DVWA)," [Online]. Available: http://www.dvwa.co.uk/.
  10. The pfSense Project, "pfSense Documentation," [Online]. Available: https://www.pfsense.org/.
  11. Open Information Security Foundation, "Suricata IDS Documentation," [Online] Available: https://suricata.io/.

The growing complexity of cyber threats has revealed critical limitations in traditional network security mechanisms. This paper presents a framework for simulating and detecting cyber-attacks using a segmented WAN DMZ LAN architecture. A virtual environment is developed with a vulnerable DMZ server and protected LAN system. A pfSense firewall and Suricata IDS are used to monitor and detect attacks. Results show improved detection and isolation of threats using segmentation and monitoring.

Keywords : Network Security, DMZ, Firewall, IDS, Cyber Attack Simulation, pfsense, Suricata.

Paper Submission Last Date
30 - April - 2026

SUBMIT YOUR PAPER CALL FOR PAPERS
Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe