We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What Is Ingress Filtering?

Mary McMahon
By
Updated: May 16, 2024
References

Ingress filtering is a computer security technique that relies on scanning incoming packets to confirm their validity. If a packet does not appear to match its purported source, the network can hold it and may refuse to allow the information through. This can protect users from malicious attacks based on spoofing, where a hacker attempts to make a packet look like it originated from somewhere else. Internet service providers (ISPs) typically use ingress filtering to defend their customers and an individual home or office network can have additional safety measures in place.

With this procedure in place, the system examines all incoming packets to get information about their origins. The system compares this information to a database to determine if a packet is indeed from the place it says it is. If it appears to be a match, it can be allowed through. If there is a problem with the source, the system can hold the packet, keeping it out of the network and protecting any users who might be attached to the network.

One potential use for ingress filtering is to combat denial of service (DOS) attacks. These attacks rely on flooding networks with packets, many of which are spoofed to conceal their origins. A system that can trap spoofed packets can keep the network running while under attack, as the network will not have to process the malicious packets. It is also possible to compare the spoofing information against known databases to connect hacking attacks for the purpose of tracking infected computers and malicious users.

Internet service providers work with each other to provide ingress filtering. They need to regularly update their own databases for the benefit of partners, and rely on updated databases maintained by other ISPs to access accurate and detailed information. This cooperation is a practical business move on the part of service providers, who can provide customers with greater safety and security by cooperating, even with rivals who may vie for customers and attention.

Within an individual home or office network, ingress filtering may also be enabled. The network can catch packets an ISP may not have identified as a problem, depending on the type of filtering used. This adds an extra layer of security for individual users, along with other safety measures like scanning incoming information for viruses and other malicious software that may pose a risk to the safety of computer systems or data on the network.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Link to Sources
Mary McMahon
By Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a EasyTechJunkie researcher and writer. Mary has a liberal arts degree from Goddard College and spends her free time reading, cooking, and exploring the great outdoors.

Discussion Comments
Mary McMahon
Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a...

Learn more
Share
https://www.easytechjunkie.com/what-is-ingress-filtering.htm
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.