Open Access   Article

Implementation of Intrusion Filtration Model

R. Dewanjee1 , S. Barde2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 35-40, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.3540

Online published on Oct 31, 2018

Copyright R. Dewanjee, S. Barde . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

Citation

IEEE Style Citation: R. Dewanjee, S. Barde, Implementation of Intrusion Filtration Model, International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.35-40, 2018.

MLA Style Citation: R. Dewanjee, S. Barde "Implementation of Intrusion Filtration Model." International Journal of Computer Sciences and Engineering 6.10 (2018): 35-40.

APA Style Citation: R. Dewanjee, S. Barde, (2018). Implementation of Intrusion Filtration Model. International Journal of Computer Sciences and Engineering, 6(10), 35-40.

VIEWS PDF XML
13 38 downloads 2 downloads
  
  
           

Abstract

Security from intrusions for alone system and in network nodes are always important. The protection and prevention methods available with antivirus and IDS/IPS are works on intrusions and provide security on all known intrusions. They have a database to match the pattern or signature of intrusion and based on that they complete the action of quarantine/repair or cleaning of file. Sometimes installation and configuration of such software occupies large space of memory and heavily slows down the speed of computer as well network. To work in full swing they must be updated time to time and also need the combinations of other security features including online facilities. Operating system and File system provided security features are not all default, they may be applied on interest of user. We are suggesting a model which will be default feature of operating system and will work for all files regardless of different interface of interaction with user.

Key-Words / Index Term

Operating system, Network security, Intrusion Filtration model, IFS, TSC, token secuirty log, file log

References

[1]. Zhenfang ZHU, "Study on Computer Trojan Horse Virus and Its Prevention", International Journal of Engineering and Applied Sciences (IJEAS) ISSN: 2394-3661, Volume-2, Issue-8, August 2015
[2]. Hossein Rouhani Zeidanloo, S. Farzaneh Tabatabaei, Payam Vahdani Amoli and Atefeh Tajpour, " All About Malwares (Malicious Codes)" Faculty of Computer Science and Information System, University of Technology Malaysia(UTM) , Kuala Lumpur, Malaysia
[3]. Benjamin A. Kuperman, Carla E. Brodley, Hilmi Ozdoganoglu, T.N. Vijaykumar, and Ankit Jalote, " DETECTION AND PREVENTION OF STACK BUFFER OVERFLOW ATTACKS", COMMUNICATIONS OF THE ACM November 2005/Vol. 48, No. 11