Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Novel Intrusion Detection Protocol for Optimal Source based Filtering in Malicious Traffic


Affiliations
1 School of Electrical En gin eerin g, Tel Aviv University, Israel
     

   Subscribe/Renew Journal


Source routing should be disabled on network routers, especially at the network perimeters. Hackers may be able to break through other friendly but less secure networks and get access to your network using this method. The world is becoming more interconnected with the advent of the Internet and new networking technology. There is a large amount of personal, commercial, military, and government information in networking infrastructures worldwide. Network security is becoming of great importance because Computer networks are very important and ever-present technology, even though the networking has more security issues. Yet the increased complexity of computer networks combined with the cleverness of attackers means that they remain vulnerable to expensive attacks from worms, viruses, Trojans, and other malicious software, which we simply refer to as malware. Network traffic filtering is one of many security methods available to network administrators.


Keywords

Intrusion Detection Protocol, Malicious Traffic, Denial of Service.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 215

PDF Views: 1




  • A Novel Intrusion Detection Protocol for Optimal Source based Filtering in Malicious Traffic

Abstract Views: 215  |  PDF Views: 1

Authors

Jason Andress
School of Electrical En gin eerin g, Tel Aviv University, Israel
Deep Medhi
School of Electrical En gin eerin g, Tel Aviv University, Israel

Abstract


Source routing should be disabled on network routers, especially at the network perimeters. Hackers may be able to break through other friendly but less secure networks and get access to your network using this method. The world is becoming more interconnected with the advent of the Internet and new networking technology. There is a large amount of personal, commercial, military, and government information in networking infrastructures worldwide. Network security is becoming of great importance because Computer networks are very important and ever-present technology, even though the networking has more security issues. Yet the increased complexity of computer networks combined with the cleverness of attackers means that they remain vulnerable to expensive attacks from worms, viruses, Trojans, and other malicious software, which we simply refer to as malware. Network traffic filtering is one of many security methods available to network administrators.


Keywords


Intrusion Detection Protocol, Malicious Traffic, Denial of Service.