Design of a pfSense-based Wireless Network to Transition from the Use of Proprietary Software in the Campus of the University of Sciences and Humanities, Lima, Peru

Design of a pfSense-based Wireless Network to Transition from the Use of Proprietary Software in the Campus of the University of Sciences and Humanities, Lima, Peru

  IJETT-book-cover           
  
© 2024 by IJETT Journal
Volume-72 Issue-8
Year of Publication : 2024
Author : Jacqueline Coquis-Flame, Hugo Flor-Cunza, Alicia Alva-Mantari
DOI : 10.14445/22315381/IJETT-V72I8P108

How to Cite?

Jacqueline Coquis-Flame, Hugo Flor-Cunza, Alicia Alva-Mantari, "Design of a pfSense-based Wireless Network to Transition from the Use of Proprietary Software in the Campus of the University of Sciences and Humanities, Lima, Peru," International Journal of Engineering Trends and Technology, vol. 72, no. 8, pp. 62-72, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I8P108

Abstract
The present work is the proposed design for the wireless network of the University of Sciences and Humanities to transition from the current design that uses the proprietary software of Ruckus Networks to a free and open-source option with pfSense to lower the costs and maintain a high level of security. In the present time, it is very important to keep the information secured, technological development has also given hackers new ways to attack networks and obtain private information, and universities and educational institutions are also at risk of intrusion from attackers. In this sense, universities need to ensure that the network on the campus has all of the proper measures in place to prevent the loss of information. For the design of the proposed network for the University of Sciences and Humanities, the configuration of pfSense was done on VirtualBox, and four VLANs were created with firewall rules to ensure higher security. Finally, the proposed network design and the firewall rules were tested with a simulation in which pfSense was installed on a laptop to act as a server. The Results show that the firewall rules and the proposed design operate appropriately for the needs of the university campus.

Keywords
pfSense, Ruckus networks, Network security, Virtual machine, VirtualBox.

References
[1] University of Calgary Paid $20K in Ransomware Attack, Canadian Broadcasting Corporation, 2016. [Online]. Available: https://www.cbc.ca/news/canada/calgary/university-calgary-ransomware-cyberattack-1.3620979
[2] John Chapman, and David Maguire, “The Impact of Cyber Security Attacks on Colleges and Universities: Who, How, and Why?,” Campus Crime: Legal, Social, pp. 1- 386, 2022.
[Google Scholar] [Publisher Link]
[3] Commscope, Security Bulletins, 2019. [Online]. Available: https://support.ruckuswireless.com/security_bulletins/299
[4] Cybersecurity & Infrastructure Security Agency, Vulnerability Summary for the Week of January 20, 2020. [Online]. Available: https://www.cisa.gov/news-events/bulletins/sb20-027
[5] Cybersecurity & Infrastructure Security Agency, CISA Adds Seven Known Exploited Vulnerabilities to Catalog, 2023. https://www.cisa.gov/news-events/alerts/2023/05/12/cisa-adds-seven-known-exploited-vulnerabilities-catalog
[6] Supriyanto Praptodiyono et al., “Development of Hybrid Intrusion Detection System Based on Suricatawith pfSense Method for High Reduction of DDOS Attacks on IPV6 Networks,” Eastern-European Journal of Enterprise
[Google Scholar] [Publisher Link]
[7] I. Oluseye-Paul, Implementation of an Intrusion Detection System on MTU Network, Mountain Top University, 2022. [Online]. Available: http://ir.mtu.edu.ng/xmlui/handle/123456789/1011
[8] Thaer Monther Alhanafi, Salah Ahmed, Mohammad A. Mikki, “Web Vulnerabilities Detection and Protection,” pp. 1-7, 2022.
[Google Scholar] [Publisher Link]
[9] Faldi Faldi, Dinamita Romadoni, and Muhammad T. Sumadi, “The Implementation of Network Server Security System Using Honeypot,” Journal of Informatics and Computers, vol. 6, no. 2, pp. 122-130, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Han Chu et al., “Analysis of Campus Network Security,” Journal of New Media, vol. 4, no. 4, pp. 219-229, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Cengiz Togay et al., “A Firewall Policy Anomaly Detection Framework for Reliable Network Security,” IEEE Transactions on Reliability, vol. 71, no. 1, pp. 339-347, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Md. Taslim Arefin et al., “Enterprise Network: Security Enhancement and Policy Management Using Next-Generation Firewall,” Computer Networks, Big Data and IoT, pp. 753-769, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] M.A. Naagas et al., “Defense-Through-Deception Network Security Model: Securing University Campus Network from DOS/DDOS Attack,” Bulletin of Electrical Engineering and Informatics, vol. 7, no. 4, pp. 593-600, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[14] José Luis Alcántara Castro, “Design and Implementation of A Multiplatform Mobile Application with Encryption and Data Privacy Functions Aimed at Student Security at the University of Sciences and Humanities, District-Los Olivos 2014,” Bachelor's thesis, University of Sciences and Humanities, pp. 1-247, 2017.
[Google Scholar] [Publisher Link]
[15] Naga Srinivasarao Chilamkurthy et al., “Low-Power Wide-Area Networks: A Broad Overview of Its Different Aspects,” IEEE Access, vol. 10, pp. 81926-81959, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Murat Kuzlu, Corinne Fair, and Ozgur Guler, “Role of Artificial Intelligence in the Internet of Things (IoT) Cybersecurity,” Discover Internet of Things, vol. 1, pp. 1-14, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Ping-Jing Lu, Ming-Che Lai, and Jun-Sheng Chang, “A Survey of High-Performance Interconnection Networks in High-Performance Computer Systems,” Electronics, vol. 11, no. 9, pp. 1-23, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] S. Muntaka et al., “An Integrated System Using Open source Nethserver OS; A Case Study of Kessben University College Local Area Network,” International Journal of Progressive Sciences and Technologies, vol. 30, no. 1, pp. 427-439, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Shamneesh Sharma et al., “Secure and Efficient Bandwidth Management for Local and Personal Area Networks Using Customized Open Source Application on a Commodity Hardware: RadSense—An Integration of pfSense Over Radius and MySQL,” Innovations in Information and Communication Technologies, pp. 379-386, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Gaurav Somani et al., “DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions,” Computer Communications, vol. 107, pp. 30-48, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Ahmad F. Subahi et al., “Packet Drop Battling Mechanism for Energy Aware Detection in Wireless Networks,” Computers, Materials & Continua, vol. 66, no. 2, pp. 2077-2086, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Andrei-Daniel Tudosi et al., “Research on Security Weakness Using Penetration Testing in a Distributed Firewall,” Sensors, vol. 23, no. 5, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Hendro Wijayanto, and Iwan Ady Prabowo, “Cybersecurity Vulnerability Behavior Scalein College During the Covid-19 Pandemic,” Sisfokom Journal (Information Systems and Computers), vol. 9, no. 3, pp. 395-399, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Shalom Adonai Huaraz Morales et al., “Augmented Reality: Prototype for the Teaching-Learning Process in Peru,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 1, pp. 806-815, 2022.
[CrossRef] [Google Scholar] [Publisher Link]