Implementation of Intrusion Filtration Model

Authors

  • Dewanjee r MATS School of Information Technology, MATS University, Raipur, India
  • Barde S MATS School of Information Technology, MATS University, Raipur, India

DOI:

https://doi.org/10.26438/ijcse/v6i10.3540

Keywords:

Operating system, Network security, Intrusion Filtration model, IFS, TSC, token secuirty log, file log

Abstract

Security from intrusions for alone system and in network nodes are always important. The protection and prevention methods available with antivirus and IDS/IPS are works on intrusions and provide security on all known intrusions. They have a database to match the pattern or signature of intrusion and based on that they complete the action of quarantine/repair or cleaning of file. Sometimes installation and configuration of such software occupies large space of memory and heavily slows down the speed of computer as well network. To work in full swing they must be updated time to time and also need the combinations of other security features including online facilities. Operating system and File system provided security features are not all default, they may be applied on interest of user. We are suggesting a model which will be default feature of operating system and will work for all files regardless of different interface of interaction with user

References

[1] Zhenfang ZHU, "Study on Computer Trojan Horse Virus and Its Prevention", International Journal of Engineering and Applied Sciences (IJEAS) ISSN: 2394-3661, Volume-2, Issue-8, August 2015

[2] Hossein Rouhani Zeidanloo, S. Farzaneh Tabatabaei, Payam Vahdani Amoli and Atefeh Tajpour, " All About Malwares (Malicious Codes)" Faculty of Computer Science and Information System, University of Technology Malaysia(UTM) , Kuala Lumpur, Malaysia

[3] Benjamin A. Kuperman, Carla E. Brodley, Hilmi Ozdoganoglu, T.N. Vijaykumar, and Ankit Jalote, " DETECTION AND PREVENTION OF STACK BUFFER OVERFLOW ATTACKS", COMMUNICATIONS OF THE ACM November 2005/Vol. 48, No. 11

Downloads

Published

2025-11-17
CITATION
DOI: 10.26438/ijcse/v6i10.3540
Published: 2025-11-17

How to Cite

[1]
R. Dewanjee and S. Barde, “Implementation of Intrusion Filtration Model”, Int. J. Comp. Sci. Eng., vol. 6, no. 10, pp. 35–40, Nov. 2025.

Issue

Section

Research Article