Protection System for Network Boundary Security

被引:0
|
作者
Huang, Xiaobo [1 ]
Zhang, Mingxue [1 ]
Wang, Xiaoyan [1 ]
机构
[1] Xuzhou Air Force Acad, Dept Fdn Courses, Xuzhou, Peoples R China
来源
PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6 | 2010年
关键词
Network Boundary; firewall; intrusion detection; identity authentication; artificial neural network; contents filtering;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To satisfy the special needs of confidential networks, a protection method of combining ingress and egress access control for network boundary security is proposed. In preventing network attacks, a combined mechanism of packets filtering firewall and intrusion detection system based on artificial neural network and rule matching is implemented to increase the accuracy of intrusion detection. In preventing information leakage, techniques of identity authentication and content filtering are integrated into the mechanism of egress access control so that strategies with more flexibility in security auditing and access control can be implemented, which is effective to prevent the sensitive or secret data from leaking out and to trace the source of leakage.
引用
收藏
页码:620 / 623
页数:4
相关论文
共 50 条
  • [21] Network and system security
    Zhou, Wanlei
    Yang Xiang
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (02) : 345 - 346
  • [22] Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment
    Thomas, Merin
    Gupta, Mohan Vishal
    Rajan, V. Gokul
    Rajalakshmi, R.
    Dixit, Rinku Sharma
    Choudhary, Shailee Lohmor
    SOFT COMPUTING, 2023,
  • [23] Computer Network Information Security and Protection Measures
    Meng, Qingbao
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON MECHATRONICS, COMPUTER AND EDUCATION INFORMATIONIZATION (MCEI 2017), 2017, 75 : 903 - 905
  • [24] Analysis and Protection of Computer Network Security Issues
    Ju Jinquan
    Al-Absi, Mohammed Abdulhakim
    Al-Absi, Ahmed Abdulhakim
    Lee, Hoon Jae
    2020 22ND INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): DIGITAL SECURITY GLOBAL AGENDA FOR SAFE SOCIETY!, 2020, : 577 - 580
  • [25] The Strategy of Computer Network Information Security and Protection
    Long, Teng
    2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 31 - 35
  • [26] Design and implementation of computer network security protection system based on artificial intelligence technology
    Liu, Cheng
    APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2023, 8 (02) : 1491 - 1508
  • [27] Study on Campus Network Security and Protection Technology
    Fu, Weihong
    Liu, Jianhua
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2955 - +
  • [28] Research on the Measures of the Computer Network Security Protection
    Fu, Longsheng
    Wu, Mingzhu
    2016 ISSGBM INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND SOCIAL SCIENCES (ISSGBM-ICS 2016), PT 3, 2016, 68 : 341 - 345
  • [29] Discussion on the Protection and Problem of Computer Network Security
    Wan, Biao
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, ARTS, ECONOMICS AND SOCIAL SCIENCE, 2016, 49 : 344 - 347
  • [30] Security Protection Strategies of Computer Communication Network
    Sun, Jiangyan
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 1293 - 1297