Rejection of Spurious Messages

Invalid messages must be rejected to avoid denial of service attacks. Spurious message identification includes detection of invalid protocols, buffer overflow detection, large message rejection, IP address spoofing and the filtering of peer addresses through white lists of acceptable sources of messages.


iWay Software