Outbound Attack Defense

Outbound Attack Defense, efficiently prevents malicious remote control and Botnet threats away from personal computer, and defenses computer operating system and network resource from malicious occupancy.

Launch Rising Internet Security 2011 program main interface and, click [Settings] -> [Net Defence] -> [Outbound Attack Interception] to configure and manage rules of outbound attack interception.

       netoutboundflood01.jpg

  Within Outbound Attack Defense, Rising Internet Security 2011 efficiently detects outbound SYN, ICMP, and UDP files. Within settings window of Outbound Attack Interception, computer users can configure Internet protocol packet types, and click button of [OK] to save changes.

Three Optional Detections:

  1. Detect SYN Flood Attack
  2. Detect ICMP Flood Attack
  3. Detect UDP Flood Attack

As to each detection contents, computer users can customize [Outbound Attack Defense] according to preferred sensitivity. Meanwhile, Rising Internet Security 2011 preset “Medium” as default interception sensitivity trigger; so while computer users customize sensitivity trigger as “High”, interception shall be executed in case of high outbound attack traffic and; while computer users customize sensitivity trigger as “Low”, interception shall be executed in case of a lower outbound attack traffic. This suggests that High level detection requires huge amount of outbound attack traffic; in the other hand, lower interception efficiency always goes with lower security sensitivity.

prev       Network Defence next       Network Data Protection