A Novel Intrusion Detection Protocol for Optimal Source based Filtering in Malicious Traffic
Subscribe/Renew Journal
Source routing should be disabled on network routers, especially at the network perimeters. Hackers may be able to break through other friendly but less secure networks and get access to your network using this method. The world is becoming more interconnected with the advent of the Internet and new networking technology. There is a large amount of personal, commercial, military, and government information in networking infrastructures worldwide. Network security is becoming of great importance because Computer networks are very important and ever-present technology, even though the networking has more security issues. Yet the increased complexity of computer networks combined with the cleverness of attackers means that they remain vulnerable to expensive attacks from worms, viruses, Trojans, and other malicious software, which we simply refer to as malware. Network traffic filtering is one of many security methods available to network administrators.
Keywords
Abstract Views: 214
PDF Views: 1