Published on: April 2026
SENTINEL WALL CYBER DEFENCE SYSTEM
Akansha Rajput Rimjhim Abhishek Yadav Harshit Tiwari Aniket
Ghaziabad UP India
Article Status
Available Documents
Abstract
The system uses Scapy to capture and analyze packets, and iptables implements the security policies enforced at an operating system level. Sentinels will use a rule-based engine to process packets received based on pre-existing configurations defined in either JSON or YAML format to allow, drop, or log the traffic. To provide users with an easy to use interface to visually see network activity as it happens, a Graphical User Interface (GUI) has been developed that provides real-time monitoring of live network activity, as well as user activity on the network, and logs of all users that have been blocked from accessing any part of the network because they represented a threat to the network.
Results from testing indicate that the Sentinel Wall Cyber Defence System effectively filters unwanted network traffic, blocks unauthorized users from gaining access to the network, and uses very little processing power; thus providing a realistic, scalable method for improving network security, particularly in small or educational environments.
Keywords:
Cybersecurity, Personal Firewall, Network Traffic Analysis, Packet Sniffing, Rule-Based Filtering, Threat Detection, System Security, Network Monitoring
How to Cite this Paper
Rajput, A., Rimjhim, , Yadav, A., Tiwari, H. & Aniket, (2026). Sentinel Wall Cyber Defence System. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.936
Rajput, Akansha, et al.. "Sentinel Wall Cyber Defence System." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.936.
Rajput, Akansha, Rimjhim,Abhishek Yadav,Harshit Tiwari, and Aniket. "Sentinel Wall Cyber Defence System." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.936.
References
[1] W. Stallings, Cryptography and Network Security, 7th ed., Pearson, 2017.[2] W. Stallings, Network Security Essentials, Pearson, 2014.
[3] NIST, “Framework for Improving Critical Infrastructure Cybersecurity,” 2018.
[4] M. Roesch, “Snort: Lightweight Intrusion Detection,” USENIX, 1999.
[5] OSSEC, “Host-Based Intrusion Detection Guide,” 2020.
[6] V. Paxson, “Bro: A System for Detecting Network Intruders,” Computer Networks, 1999.
[7] S. Miettinen et al., “IoT Sentinel,” IEEE ICDCS, 2017.
[8] A. Javaid et al., “Deep Learning for Network Intrusion Detection,” IEEE, 2016.
[9] Y. Xin et al., “Machine Learning for Cybersecurity,” IEEE Access, 2018.
[10] A. Patcha and J. Park, “An Overview of Anomaly Detection,” Computer Networks, 2007.
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: May 01 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.
← Previous Article
Sentiment Analysis of Twitter DataNext Article →
SHE FOUND

