Protection System for Network Boundary Security

被引:0
作者
Huang, Xiaobo [1 ]
Zhang, Mingxue [1 ]
Wang, Xiaoyan [1 ]
机构
[1] Xuzhou Air Force Acad, Dept Fdn Courses, Xuzhou, Peoples R China
来源
PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6 | 2010年
关键词
Network Boundary; firewall; intrusion detection; identity authentication; artificial neural network; contents filtering;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To satisfy the special needs of confidential networks, a protection method of combining ingress and egress access control for network boundary security is proposed. In preventing network attacks, a combined mechanism of packets filtering firewall and intrusion detection system based on artificial neural network and rule matching is implemented to increase the accuracy of intrusion detection. In preventing information leakage, techniques of identity authentication and content filtering are integrated into the mechanism of egress access control so that strategies with more flexibility in security auditing and access control can be implemented, which is effective to prevent the sensitive or secret data from leaking out and to trace the source of leakage.
引用
收藏
页码:620 / 623
页数:4
相关论文
共 50 条
[21]   Influence of state size on user models in a network security system [J].
McMahon, MM ;
Sholl, HA .
PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2000, :495-500
[22]   Proposed structure of a network security system using dynamic authentication [J].
McMahon, MM ;
Sholl, HA ;
Ammar, RA .
PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2001, :183-189
[23]   Design and Implementation of Enterprise Network Security System Based on Firewall [J].
Yuan, Hui ;
Zheng, Lei ;
Qiu, Shuang ;
Peng, Xiangli ;
Liang, Yuan ;
Hu, Yaodong ;
Deng, Guoru .
CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 :1070-1078
[24]   Network Intrusion Detection for Cyber Security on Neuromorphic Computing System [J].
Alom, Md Zahangir ;
Taha, Tarek M. .
2017 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2017, :3830-3837
[25]   NetSecRadar: A Real-Time Visualization System for Network Security [J].
Zhao, Ying ;
Zhou, Fangfang ;
Shi, Ronghua .
2012 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2012, :281-282
[26]   Machine learning for mobile network payment security evaluation system [J].
Wang, Fei ;
Yang, Nan ;
Shakeel, P. Mohamed ;
Saravanan, Vijayalakshmi .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
[27]   Design of Multimedia Education Network Security and Intrusion Detection System [J].
Yansong Liu ;
Li Zhu ;
Feng Liu .
Multimedia Tools and Applications, 2020, 79 :18801-18814
[28]   A Novel Intrusion Detection System for Internet of Things Network Security [J].
Bediya, Arun Kumar ;
Kumar, Rajendra .
JOURNAL OF INFORMATION TECHNOLOGY RESEARCH, 2021, 14 (03) :20-37
[29]   Design of intrusion detection system oriented to computer network security [J].
Lou, Xiao .
PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017), 2017, 141 :258-262
[30]   A multi-agent system for computer network security monitoring [J].
Prusiewicz, Agnieszka .
AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2008, 4953 :842-849