Automatic Network Reconfiguration Method with Dynamic IP Address Management
DOI:
https://doi.org/10.20535/2786-8729.6.2025.334139Keywords:
Zabbix, pfSense, network security, anomaly detection, automated responseAbstract
In the context of growing cyber threats, systems capable not only of detecting anomalies in the operation of network infrastructure but also of promptly responding to them without administrator intervention are becoming increasingly relevant. This paper proposes a method for automatic network reconfiguration based on the integration of the Zabbix monitoring system with the pfSense network gateway functionality. Such a system enables centralized control of the operating system status, resource usage, and network activity, while also allowing for automatic changes to host IP addresses, routing adaptation, and connection restrictions according to defined security policies.
The aim of the study is to develop a method for automatic network monitoring and reconfiguration with dynamic IP address changes to improve the effectiveness of cyber threat mitigation. The object of the study is the processes of information security management in computer networks. The subject of the study includes methods of anomaly detection and automatic response through modification of network parameters using Zabbix and pfSense.
In the context of automatic response to detected threats, the method of comprehensive monitoring of client host operating systems has been formalized, including subsequent analysis of logs, user actions, resource load, network port usage, and interaction with external services. A methodology for network reconfiguration after anomaly detection has been developed and implemented: in particular, changing the IP address while maintaining functionality in a minimal network access configuration and isolating the node using pfSense. Scripts for Windows client OS were employed, interacting with the Zabbix and pfSense APIs, thus ensuring dynamic and fully automated operation.
Testing results of the proposed system in a simulated environment confirm its effectiveness. Compared to manual or partially automated solutions, incident response time was reduced, and the risk of attack propagation within the network was minimized.
References
A. Mosteiro Vázquez, C. Dafonte, and Á. Gómez, “Open Source Monitoring System for IT Infrastructures Incorporating IoT-Based Sensors,” Proceedings, vol. 54, no. 1, p. 56, 2020. [Online]. Available: https://doi.org/10.3390/proceedings2020054056
Y. Zhao, L. Zhang, X. Li, “Research on Zabbix Monitoring System for Large-scale Smart Campus Network from a Distributed Perspective, ” Journal of Engineering Sciences, vol. 54, no. 1, pp. 56–65, 2024. [Online]. Available: https://journal.esrgroups.org/jes/article/view/5153
A. Mardiyono, W. Sholihah, and F. Hakim, “Mobile-based Network Monitoring System Using Zabbix and Telegram,” 2020 3rd International Conference on Computer and Informatics Engineering (IC2IE), Yogyakarta, Indonesia, 2020, pp. 473–477, https://doi.org/10.1109/IC2IE50715.2020.9274582.
A. Suparman, E. P. A. Akhmad, and B. M. Dinata, “Leveraging Artificial Intelligence for Enhancing Cybersecurity: A Deep Learning Approach to Real-Time Threat Detection,” The Journal of Academic Science, vol. 1, no. 7, pp. 835–842, Nov. 2024, https://doi.org/10.59613/0yv79c49
N. Ahmed, M. E. Hossain, Z. Hossain, and F. Kabir, “AI-Enabled System for Efficient Cyber Incident Detection and Response in Cloud Environments: Safeguarding Against Systematic Attacks,” Indonesian Journal of Educational Science and Technology, Nov. 2024, https://doi.org/10.55927/nurture.v3i4.16.
M. Arafune et al., “Design and Development of Automated Threat Hunting in Industrial Control Systems,” 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 2022, pp. 618–623, https://doi.org/10.1109/PerComWorkshops53856.2022.9767375.
N. Katiyar, S. Tripathi, P. Kumar, and S. Verma, “AI and Cyber-Security: Enhancing threat detection and response with machine learning,” Educational Administration Theory and Practice Journal, vol. 30, no. 4, Apr. 2024, https://doi.org/10.53555/KUEY.V30I4.2377.
Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions,” Electronics, vol. 12, no. 6, Art. no. 1333, Mar. 2023, https://doi.org/10.3390/electronics12061333.
A. I. Jony and S. A. Hamim, “Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age,” Journal of Information Technology and Cyber Security, vol. 1, no. 2, pp. 53–67, Jul. 2023, https://doi.org/10.30996/jitcs.9715.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Information, Computing and Intelligent systems

This work is licensed under a Creative Commons Attribution 4.0 International License.