Authors :
S. Sangamithra; Ajaay Pranav O. B.; Bharath J. B.; Sanjeevi K. S.
Volume/Issue :
Volume 11 - 2026, Issue 3 - March
Google Scholar :
https://tinyurl.com/399vn37c
Scribd :
https://tinyurl.com/43z6t8wm
DOI :
https://doi.org/10.38124/ijisrt/26mar1610
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
The growing complexity of cyber threats has revealed critical limitations in traditional network security
mechanisms. This paper presents a framework for simulating and detecting cyber-attacks using a segmented WAN DMZ
LAN architecture. A virtual environment is developed with a vulnerable DMZ server and protected LAN system. A
pfSense firewall and Suricata IDS are used to monitor and detect attacks. Results show improved detection and isolation
of threats using segmentation and monitoring.
Keywords :
Network Security, DMZ, Firewall, IDS, Cyber Attack Simulation, pfsense, Suricata.
References :
- “Survey on Intrusion Detection Systems in Software- Defined Networking,” 2025.
- L. Diana, P. Dini, and D. Paolini, "Overview on Intrusion Detection Systems for Computer Network Security", 2025.
- W. Stallings, Network Security Essentials: Applications and Standards, 6th ed., Pearson Education, 2017.
- A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection," SIAM International Conference on Data Mining, 2003, pp. 25–36, doi: 10.1137/1.9781611972733.3.
- R. Sommer and V. Paxson, "Outside the Closed World: On Using Machine Learning for Network Intrusion Detection," IEEE Symposium on Security and Privacy, 2010, pp. 305–316, doi: 10.1109/SP.2010.25.
- S. Axelsson, "Intrusion Detection Systems: A Survey and Taxonomy," Technical Report No. 99-15, Chalmers University, 2000.
- S. Kumar and E. H. Spafford, "A Pattern Matching Model for Misuse Intrusion Detection," Proceedings of the 17th National Computer Security Conference, 1994.
- J. Zhang, M. Zulkernine, and A. Haque, "Random-Forests-Based Network Intrusion Detection Systems," IEEE Transactions on Systems, Man, and Cybernetics, vol. 38, no. 5, pp. 649–659, 2008, doi: 10.1109/TSMCB.2008.2001303.
- Digininja, "Damn Vulnerable Web Application (DVWA)," [Online]. Available: http://www.dvwa.co.uk/.
- The pfSense Project, "pfSense Documentation," [Online]. Available: https://www.pfsense.org/.
- Open Information Security Foundation, "Suricata IDS Documentation," [Online] Available: https://suricata.io/.
The growing complexity of cyber threats has revealed critical limitations in traditional network security
mechanisms. This paper presents a framework for simulating and detecting cyber-attacks using a segmented WAN DMZ
LAN architecture. A virtual environment is developed with a vulnerable DMZ server and protected LAN system. A
pfSense firewall and Suricata IDS are used to monitor and detect attacks. Results show improved detection and isolation
of threats using segmentation and monitoring.
Keywords :
Network Security, DMZ, Firewall, IDS, Cyber Attack Simulation, pfsense, Suricata.