Skip to content
geeksforgeeks
  • Tutorials
    • Python
    • Java
    • Data Structures & Algorithms
    • ML & Data Science
    • Interview Corner
    • Programming Languages
    • Web Development
    • CS Subjects
    • DevOps And Linux
    • School Learning
    • Practice Coding Problems
  • Courses
    • DSA to Development
    • Get IBM Certification
    • Newly Launched!
      • Master Django Framework
      • Become AWS Certified
    • For Working Professionals
      • Interview 101: DSA & System Design
      • Data Science Training Program
      • JAVA Backend Development (Live)
      • DevOps Engineering (LIVE)
      • Data Structures & Algorithms in Python
    • For Students
      • Placement Preparation Course
      • Data Science (Live)
      • Data Structure & Algorithm-Self Paced (C++/JAVA)
      • Master Competitive Programming (Live)
      • Full Stack Development with React & Node JS (Live)
    • Full Stack Development
    • Data Science Program
    • All Courses
  • DSA
  • Practice Problems
  • C
  • C++
  • Java
  • Python
  • JavaScript
  • Data Science
  • Machine Learning
  • Courses
  • Linux
  • DevOps
  • SQL
  • Web Development
  • System Design
  • Aptitude
  • GfG Premium
Open In App
Next Article:
Ingress Filtering
Next article icon

Ingress Filtering

Last Updated : 08 Aug, 2022
Comments
Improve
Suggest changes
Like Article
Like
Report

Ingress filtering is a technology that is designed to classify and prevent internet access by identifying unauthorized users. What ensures the security of an organization’s systems is a high-functioning ingress filtering system. The process of ingress filtering can be complex, but the main purpose behind it is to provide support for malicious cyberattacks, and it helps organizations identify unauthorized users and attacks on their networks. In order to understand how this technology works, one must first understand its goal.

A malicious hacker can take advantage of a weak firewall. A hacker can gain access to a system by simply entering the correct username and password (usually there is no need for a brute force attack). This unauthorized user has gained access to their system, and they will next try to look for valuable information within their network. The hacker may attempt to get into more systems after this point by using other methods such as social engineering, port scanning, or spear phishing. In order to protect their network, organizations must deploy an ingress filtering system that performs a deep dive analysis of the traffic that is being sent from an endpoint device (endpoint security) in order to identify unauthorized users and attacks on the network.

Ingress filtering is basically a process that examines every packet that enters a network in order to determine whether it should be allowed or denied access. With ingress filtering, the firewall acts as the intermediary between two systems and evaluates all traffic in an attempt to determine if it is malicious, and if so, blocks it or simply discards it.

Once an organization deploys an ingress filtering system, they can install software that detects network intrusion and back door attacks such as spyware, viruses, rootkits, remote administration tools, and Trojans. At this point, the software will try to identify any backdoors that are on their network.

Benefits:

  • The ingress filter can detect unauthorized users before they have a chance to breach the business' systems, thus preventing potential damage to the organization.
  • Another benefit is that it can prevent unauthorized users from gaining access to valuable data and information within the company's network.

Disadvantages:

  • The process of ingress filtering can be complex, and so an organization may need to hire an IT professional for installation and maintenance purposes. However, most experts agree that it is worth investing in this process because it will provide security benefits.

Countermeasures:

Organizations can rely on the following countermeasures when trying to prevent unauthorized access to their network:

  • Access control lists (ACLs).
  • Port security.
  • Web Application firewalls.
  • Packet filtering and inspection firewalls.
  • Intrusion detection systems and intrusion prevention systems.
  • Authentication, authorization, and accounting (AAA) features of a router or switch.
  • Secure remote access solutions such as virtual private networks (VPNs) and SSH tunneling are designed to encrypt traffic between the endpoint device (endpoint security) and the desired resources in the network.
  • Having a strong anti-malware solution.

Conclusion:

Ingress filtering is a must for any organization that wants to provide the best security to its network. Trustworthy and reliable ingress filtering can amplify the cyber defense of your organization and prevent unauthorized intrusion.


Next Article
Ingress Filtering

P

psatyavavk6
Improve
Article Tags :
  • Ethical Hacking
  • Ethical Hacking - Enumeration

Similar Reads

    Servlet - FilterChain
    A filter is an object that is used throughout the pre-and post-processing stages of a request. Conversion, logging, compression, encryption and decryption, input validation, and other filtering operations are commonly performed using it. Servlet Filter Chain We will learn how to correlate a chain of
    5 min read
    What is Egress Filtering?
    Egress Filtering is the term for filtering data packets as they leave your network. This is usually performed on an Intrusion Prevention System or firewall that monitors traffic, either inbound or outbound, from the network. This will often be in addition to other firewall protocols such as Domain N
    4 min read
    Servlet - Filter
    A filter is an object that is used throughout the pre-and post-processing stages of a request. Filters are mostly used for filtering tasks such as server-side logging, authentication, and authorization, input validation, and so on. The servlet is pluggable, which means that the entry is specified in
    3 min read
    Filtering in Computer Graphics
    Computer graphics are everywhere in today’s world. From movies and video games to websites and digital art, they are used to create visuals that are more exciting and engaging. A key part of computer graphics is filtering. It is used to modify images, adding effects to enhance their aesthetic appeal
    6 min read
    Band Pass Filter
    Signal processing is incomplete without bandpass filters, which are special-purpose devices that pass only a particular range of signals while attenuating all others that lie outside this range. These filters can be passive or active with different designs and concepts respectively. In the case of p
    14 min read
geeksforgeeks-footer-logo
Corporate & Communications Address:
A-143, 7th Floor, Sovereign Corporate Tower, Sector- 136, Noida, Uttar Pradesh (201305)
Registered Address:
K 061, Tower K, Gulshan Vivante Apartment, Sector 137, Noida, Gautam Buddh Nagar, Uttar Pradesh, 201305
GFG App on Play Store GFG App on App Store
Advertise with us
  • Company
  • About Us
  • Legal
  • Privacy Policy
  • In Media
  • Contact Us
  • Advertise with us
  • GFG Corporate Solution
  • Placement Training Program
  • Languages
  • Python
  • Java
  • C++
  • PHP
  • GoLang
  • SQL
  • R Language
  • Android Tutorial
  • Tutorials Archive
  • DSA
  • Data Structures
  • Algorithms
  • DSA for Beginners
  • Basic DSA Problems
  • DSA Roadmap
  • Top 100 DSA Interview Problems
  • DSA Roadmap by Sandeep Jain
  • All Cheat Sheets
  • Data Science & ML
  • Data Science With Python
  • Data Science For Beginner
  • Machine Learning
  • ML Maths
  • Data Visualisation
  • Pandas
  • NumPy
  • NLP
  • Deep Learning
  • Web Technologies
  • HTML
  • CSS
  • JavaScript
  • TypeScript
  • ReactJS
  • NextJS
  • Bootstrap
  • Web Design
  • Python Tutorial
  • Python Programming Examples
  • Python Projects
  • Python Tkinter
  • Python Web Scraping
  • OpenCV Tutorial
  • Python Interview Question
  • Django
  • Computer Science
  • Operating Systems
  • Computer Network
  • Database Management System
  • Software Engineering
  • Digital Logic Design
  • Engineering Maths
  • Software Development
  • Software Testing
  • DevOps
  • Git
  • Linux
  • AWS
  • Docker
  • Kubernetes
  • Azure
  • GCP
  • DevOps Roadmap
  • System Design
  • High Level Design
  • Low Level Design
  • UML Diagrams
  • Interview Guide
  • Design Patterns
  • OOAD
  • System Design Bootcamp
  • Interview Questions
  • Inteview Preparation
  • Competitive Programming
  • Top DS or Algo for CP
  • Company-Wise Recruitment Process
  • Company-Wise Preparation
  • Aptitude Preparation
  • Puzzles
  • School Subjects
  • Mathematics
  • Physics
  • Chemistry
  • Biology
  • Social Science
  • English Grammar
  • Commerce
  • World GK
  • GeeksforGeeks Videos
  • DSA
  • Python
  • Java
  • C++
  • Web Development
  • Data Science
  • CS Subjects
@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy
Lightbox
Improvement
Suggest Changes
Help us improve. Share your suggestions to enhance the article. Contribute your expertise and make a difference in the GeeksforGeeks portal.
geeksforgeeks-suggest-icon
Create Improvement
Enhance the article with your expertise. Contribute to the GeeksforGeeks community and help create better learning resources for all.
geeksforgeeks-improvement-icon
Suggest Changes
min 4 words, max Words Limit:1000

Thank You!

Your suggestions are valuable to us.

What kind of Experience do you want to share?

Interview Experiences
Admission Experiences
Career Journeys
Work Experiences
Campus Experiences
Competitive Exam Experiences