Articles | Open Access | https://doi.org/10.37547/ijasr-03-06-12

IMPLEMENTING PACKET CLASSIFICATION USING STANDARD ACL

Nurbek Nasrullayev Nurafshon Branch Of Tashkent University Of Information Technologies Named After Muhammad Al-Khwarizmi, Tashkent Region, Uzbekistan Dilnoza Sodikova Tashkent University Of Information Technologies Named After Muhammad Al-Khwarizmi Cybersecurity And Criminology Department Tashkent, Uzbekistan Nuriddin Safoev Tashkent University Of Information Technologies Named After Muhammad Al-Khwarizmi Cybersecurity And Criminology Department Tashkent, Uzbekistan Qurbonova Kabira Erkinovna Tashkent State Technical University Named After Islam Karimov, Tashkent, Uzbekistan

Abstract

Packet classification involves the categorization of packets within network systems, such as firewalls and routers, based on their flow. Its primary objective is to match packet headers with a predefined set of filters. In this research, we propose a system that utilizes the source IP address of each incoming packet for packet classification. By employing a rule set, the system can determine whether to grant or deny access to each packet. The algorithm examines the source IP address header field of received packets on a specific link and compares it against a collection of rules. It then outputs the action associated with the highest priority rule that corresponds to the packet header. Ultimately, the classification of individual packets is based on the action specified in the rule set.

Keywords

Packet Classification, Firewalls, Routers

References

Gupta, P., & McKeown, N. (2001). Algorithms for packet classification. IEEE Network, 15(2), 24-32.

Xu B., Jiang D., Li J. HSM: A fast packet classification algorithm //19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers). – IEEE, 2005. – Т. 1. – С. 987-992.

Gupta P., McKeown N. Packet classification using hierarchical intelligent cuttings //Hot Interconnects VII. – 1999. – Т. 40.

Gupta P., McKeown N. Packet classification on multiple fields //Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication. – 1999. – С. 147-160.

Taylor, D. E. (2005). Survey and taxonomy of packet classification techniques. ACM Computing Surveys (CSUR), 37(3), 238-275.

Bakhodir, Y., Nurbek, N., & Odiljon, Z. (2019). Methods for applying of scheme of packet filtering rules. International Journal of Innovative Technology and Exploring Engineering, 8(11), 1014-1019.

Safoev, Nuriddin, and Jun-Cheol Jeon. "Area efficient QCA Barrel shifter." Advanced Science and Technology Letters (2017): 51-57.

Safoev, Nuriddin, and Jun-Cheol Jeon. "Full adder based on quantum-dot cellular automata." Proceedings of international conference of trends in engineering and technology. 2017.

Safoev, N., and J. C. Jeon. "Reliable design of reversible universal gate based on QCA." Advanced Science Letters 23.10 (2017): 9818-9823.

Safoev, Nuriddin, and Jun-Cheol Jeon. "Coplanar QCA adders for arithmetic circuits." International Journal of Engineering & Technology 7.4.4 (2018): 15-16.

Gulomov, S. R., & Bakhtiyorovich, N. N. (2016, November). Method for security monitoring and special filtering traffic mode in info communication systems. In 2016 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-6). IEEE.

Malikovich, K. M., Rajaboevich, G. S., & Karamatovich, Y. B. (2019, November). Method of constucting packet filtering rules. In 2019 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-4). IEEE.

Насруллаев, Н. Б., & Файзиева, Д. С. (2020). Анализ средств службы информационной безопасности в дистанционном обучении. Молодой ученый, (31), 14-18.

Baxtiyorovich, N. N., & Ubaydullaevna, H. I. (2019, November). Method of analyzing of antivirus errors when audit provides. In 2019 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-3). IEEE.

Safoev, N., and J. C. Jeon. "Peres gate realization in QCA for reversible binary incrementer." Advanced Science Letters 23.10 (2017): 9812-9817.

Komil, T., & Nurbek, N. (2015). Development method of code detection system on based racewalk algorithm on platform FPGA. In Proceedings of International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE) (p. 278). International Conference on Application of Information and Communication Technology and Statistics and Economy and Education (ICAICTSEE).

Safoev, N., & Nasrullaev, N. (2021, November). Low area QCA Demultiplexer Design. In 2021 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 01-05). IEEE.

Yakubdjanovna, I. D., Bakhtiyarovich, N. N., & lqbol Ubaydullayevna, X. (2020, November). Implementation of intercorporate correlation of information security messages and audits. In 2020 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-4). IEEE.

Cohen, M. I., Bilby, D., & Caronni, G. (2011). Distributed forensics and incident response in the enterprise. digital investigation, 8, S101-S110.

Mrdovic, S., Huseinovic, A., & Zajko, E. (2009, October). Combining static and live digital forensic analysis in virtual environment. In 2009 XXII International Symposium on Information, Communication and Automation Technologies (pp. 1-6). IEEE.

Hay, B., Bishop, M., & Nance, K. (2009). Live analysis: Progress and challenges. IEEE Security & Privacy, 7(2), 30-37.

Wang, L., Zhang, R., & Zhang, S. (2009, December). A model of computer live forensics based on physical memory analysis. In 2009 First International Conference on Information Science and Engineering (pp. 4647-4649). IEEE.

Alazab, M., Venkatraman, S., & Watters, P. (2009, June). Digital forensic techniques for static analysis of NTFS images. In Proceedings of ICIT2009, Fourth International Conference on Information Technology, IEEE Xplore.

Sherzod Rajaboevich, G., Dilmurod Gulamovich, A., & Nurbek Bakhtiyorovich, N. (2019). Method for determination of the probabilities of functioning states of information of protection on cloud computing. International Journal of Mechanical Engineering and Technology, 10(3).

Safoev, N., and J. C. Jeon. "Cell interaction based QCA multiplexer for complex circuit design." Advanced Science Letters 23.10 (2017): 10097-10101.

Shakarov, M., Safoev, N., & Nasrullaev, N. (2022). Обеспечение безопасности интернет вещей в промышленности 4.0 с использованием WAF. Research and Education, 1(9), 386-393.

Насруллаев, Н., Муминова, С., Сейдуллаев, М., & Сафоев, Н. (2022). Внедрение DMZ для повышения сетевой безопасности веб-тестирования. Scientific Collection «InterConf», (110), 641-649.

Rajaboevich, G. S., Baxtiyorovich, N. N., & Komilovich, T. S. (2021, November). A model for preventing malicious traffic in DNS servers using machine learning. In 2021 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-4). IEEE.

Safoev, N., and J. C. Jeon. "Low complexity design of conservative QCA with two-pair error checker." Advanced Science Letters 23.10 (2017): 10077-10081.

Rajaboevich, G. S., Baxtiyarovich, N. N., & Salimovna, F. D. (2020, November). Methods and intelligent mechanisms for constructing cyberattack detection components on distance-learning systems. In 2020 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-6). IEEE.

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

IMPLEMENTING PACKET CLASSIFICATION USING STANDARD ACL. (2023). International Journal of Advance Scientific Research, 3(06), 63-71. https://doi.org/10.37547/ijasr-03-06-12