Open Access Open Access  Restricted Access Subscription or Fee Access

QoS based Optimal Source Filtering for Malicious Traffic Environment for Network Stability

John R. Long, P. Enoksson, V. Peiris


In data transmission, network faces two main problems namely Traffic and spam. Nowadays many researchers were working in traffic filtering systems to find and filter the traffic over the network. The Optimal Source Filtering (OSF) is a system which is proposed and implemented for filtering mechanism. The spam and malicious traffic over a network has been monitored and filtered by a method called DROP. While encounter malicious traffic these systems are highly ineffective. Based on the user rule the efficiency of the firewall and filters were improved by the OSF protocol, introduced by the proposed system. To recover the problem the proposed filtering scheme provides TFS false filtering while the flash crowd occurs. The data priority model verifies user and firewall’s rules and policies by the protocol, which makes the filtering process more efficient. By monitoring outgoing messages the proposed spam detection project identifies and eliminates unwanted messages. In the network the spam detection is the task which is more complicated. According to the user’s rule and request, the current system monitors every outgoing message from the sender and identifies the spam and zombies.


Traffic Filtering Systems, QoS Filtering Algorithm, Optimal Source based Filtering.

Full Text:



Azadeh Noori Hoshyar, Adel Al-Jumailya , Afsaneh Noori Hoshyar.(2014). Comparing the Performance of Various Filters on Skin Cancer Images, International, ConfPRIDE 2013-2014, Procedia Computer Science, 42.

Chithra, P. L., & Henila, M. (2017). Defect identification in the fruit apple using K-Means Color Image Segmentation Algorithm. International Journal of Advanced Research in Computer Science, 8(8).

Dargie, W. and Poellabauer, C., "Fundamentals of wireless sensor networks: theory and practice", John Wiley and Sons, 2010 ISBN 978- 0-470-99765-9, pp. 168–183, 191–192

H.-J. Liao, C.-H. Richard Lin, Y.-C. Lin, and K.-Y. Tung, "Intrusion detection system: a comprehensive review," J Netw Comput Appl, vol. 36, no. 1, pp. 16–24, 2013a/01/01/ 2013

Huang, X.; Du, X.; Song, B. An Effective DDoS Defense Scheme for SDN. In Proceedings of the IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–6.

J. Lyngdoh, M. I. Hussain, S. Majaw, and H. K. Kalita, "An intrusion detection method using artificial immune system approach," in International conference on advanced informatics for computing research, 2018, pp. 379–387.

J. M. Gonzalez, M. Anwar, and J. B. D. Joshi, “A trust-based approach against IP-spoofing attacks,” 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp. 63–70, Jul. 2011.

Jia, Q.; Wang, H.; Fleck, D.; Li, F.; Stavrou, A.; Powell, W. Catch Me if You Can: A Cloud-Enabled DDoS Defense. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, USA, 23–26 June 2014; pp. 264–275.

Kang, S.K.; Gligor, V.D.; Sekar, V. SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks. In Proceedings of the Internet Society—Networks, Distributed Systems and Security Symposium, San Diego, CA, USA, 21–24 February 2016.

P Jain, G Kaur, (2011). Analysis the impact of filters in spatial domain on grayscale image. International journal of computer applications, 36(11).

P. G. Neumann, “Inside Risks: denial-of-service attacks,” Commun. ACM, vol. 43, no. 4, p. 136, Apr. 2000.

Pawan Kumar Patidar, Lalit, Baldev Singh, Gaurav Bagaria (2014). Image Filtering using Linear and Non Linear Filter for Gaussian Noise, International Journal of Computer Applications, 93(8).

Pawar, Mohan V., and J. Anuradha. "Network security and types of attacks in network." Procedia Computer Science 48 (2015): 503-506.

Ward, Joseph, and Andrew Hobson. "Traffic simulation to identify malicious activity." U.S. Patent No. 10,084,806. 25 Sep. 2018.

Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt, and T. Wobber, “How dynamic are IP addresses?,” in Proc. ACM SIGCOMM, Kyoto, Japan, Aug. 2007, pp. 301–312.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.