Open Access Open Access  Restricted Access Subscription or Fee Access

A Novel Intrusion Detection Protocol for Optimal Source based Filtering in Malicious Traffic

Jason Andress, Deep Medhi

Abstract


Source routing should be disabled on network routers, especially at the network perimeters. Hackers may be able to break through other friendly but less secure networks and get access to your network using this method. The world is becoming more interconnected with the advent of the Internet and new networking technology. There is a large amount of personal, commercial, military, and government information in networking infrastructures worldwide. Network security is becoming of great importance because Computer networks are very important and ever-present technology, even though the networking has more security issues. Yet the increased complexity of computer networks combined with the cleverness of attackers means that they remain vulnerable to expensive attacks from worms, viruses, Trojans, and other malicious software, which we simply refer to as malware. Network traffic filtering is one of many security methods available to network administrators.


Keywords


Intrusion Detection Protocol, Malicious Traffic, Denial of Service.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.