Implementation of Intrusion Filtration Model
DOI:
https://doi.org/10.26438/ijcse/v6i10.3540Keywords:
Operating system, Network security, Intrusion Filtration model, IFS, TSC, token secuirty log, file logAbstract
Security from intrusions for alone system and in network nodes are always important. The protection and prevention methods available with antivirus and IDS/IPS are works on intrusions and provide security on all known intrusions. They have a database to match the pattern or signature of intrusion and based on that they complete the action of quarantine/repair or cleaning of file. Sometimes installation and configuration of such software occupies large space of memory and heavily slows down the speed of computer as well network. To work in full swing they must be updated time to time and also need the combinations of other security features including online facilities. Operating system and File system provided security features are not all default, they may be applied on interest of user. We are suggesting a model which will be default feature of operating system and will work for all files regardless of different interface of interaction with user
References
[1] Zhenfang ZHU, "Study on Computer Trojan Horse Virus and Its Prevention", International Journal of Engineering and Applied Sciences (IJEAS) ISSN: 2394-3661, Volume-2, Issue-8, August 2015
[2] Hossein Rouhani Zeidanloo, S. Farzaneh Tabatabaei, Payam Vahdani Amoli and Atefeh Tajpour, " All About Malwares (Malicious Codes)" Faculty of Computer Science and Information System, University of Technology Malaysia(UTM) , Kuala Lumpur, Malaysia
[3] Benjamin A. Kuperman, Carla E. Brodley, Hilmi Ozdoganoglu, T.N. Vijaykumar, and Ankit Jalote, " DETECTION AND PREVENTION OF STACK BUFFER OVERFLOW ATTACKS", COMMUNICATIONS OF THE ACM November 2005/Vol. 48, No. 11
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
