A Literature Survey on Portable Raspberry PI-Based LAN Defense System.
EDWIN DOMINIC
Department of Computer Science and Engineering (Cyber Security) Vimal Jyothi Engineering College Chemperi, Kannur edwindominic7878@gmail.com
ABHINANDH P NARAYAN
Department of Computer Science and Engineering (Cyber Security) Vimal Jyothi Engineering College Chemperi, Kannur abhinandhpnarayan@gmail.com
ELIZEBATH JESLIN
Department of Computer Science and Engineering (Cyber Security) Vimal Jyothi Engineering College Chemperi, Kannur elizebathjeslin75@gmail.com
MOHAMMED ADNAN
Department of Computer Science and Engineering (Cyber Security)
Vimal Jyothi Engineering College Chemperi, Kannur zaynadnan014@gmail.com
MAFNITHA KK
Assistant Professor
Department of Computer Science and Engineering (Cyber Security)
Vimal Jyothi Engineering College Chemperi, Kannur mafnitha@vjec.ac.in
Abstract—The rapid growth of connected devices in homes, offices, and academic environments has expanded the risk sur- face for cyberattacks, often leaving small networks unprotected against sophisticated threats. To address this gap, DefenderPi is proposed as a lightweight, portable, and cost-effective security appliance built on Raspberry Pi 4. Operating in Wi-Fi Access Point mode, DefenderPi functions as an inline security gateway that not only routes traffic but also inspects, filters, and mitigates malicious activity in real time. Unlike conventional monitoring tools that are limited to passive logging, DefenderPi integrates firewall enforcement, intrusion detection, DNS anomaly analysis, phishing and malware protection, and honeypot-based deception within a fully automated system. The solution further enhances usability through a Flask-based dashboard for live threat visual- ization and instant alerting via email or Telegram, requiring no advanced technical expertise from end users. With its plug-and- play design, AI-driven anomaly detection modules, and modular add-on capabilities, DefenderPi demonstrates a practical and scalable approach to democratizing network defense, making enterprise-grade protection feasible for small organizations, IoT ecosystems, and personal networks.