Protection System for Network Boundary Security

被引:0
作者
Huang, Xiaobo [1 ]
Zhang, Mingxue [1 ]
Wang, Xiaoyan [1 ]
机构
[1] Xuzhou Air Force Acad, Dept Fdn Courses, Xuzhou, Peoples R China
来源
PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6 | 2010年
关键词
Network Boundary; firewall; intrusion detection; identity authentication; artificial neural network; contents filtering;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To satisfy the special needs of confidential networks, a protection method of combining ingress and egress access control for network boundary security is proposed. In preventing network attacks, a combined mechanism of packets filtering firewall and intrusion detection system based on artificial neural network and rule matching is implemented to increase the accuracy of intrusion detection. In preventing information leakage, techniques of identity authentication and content filtering are integrated into the mechanism of egress access control so that strategies with more flexibility in security auditing and access control can be implemented, which is effective to prevent the sensitive or secret data from leaking out and to trace the source of leakage.
引用
收藏
页码:620 / 623
页数:4
相关论文
共 50 条
[41]   Integrating Visual Analysis of Network Security and Management of Detection System Configurations [J].
Hellmann, Bastian ;
Ahlers, Volker ;
Rodosek, Gabi Dreo .
PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 2, 2017, :1020-1025
[42]   Information Security Protection System based on Intrusion Detection from Real Time Angle [J].
Qian, Yue ;
Zhang, Siyuan .
PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MACHINERY, ELECTRONICS AND CONTROL SIMULATION (MECS 2017), 2017, 138 :507-511
[43]   Network Security Framework [J].
Gupta, Kapil Kumar ;
Nath, Baikunth ;
Ramamohanarao, Kotagiri .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (7B) :151-157
[44]   Zero-Touch Network Security (ZTNS): A Network Intrusion Detection System Based on Deep Learning [J].
Qazi, Emad-Ul-Haq ;
Zia, Tanveer ;
Hamza Faheem, Muhammad ;
Shahzad, Khurram ;
Imran, Muhammad ;
Ahmed, Zeeshan .
IEEE ACCESS, 2024, 12 :141625-141638
[45]   A Practical Data Security Protection Technology [J].
Fang Zenan ;
Zhou Jianming ;
Zhang Jingsong .
ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 :1620-+
[46]   Network security defense model based on firewall and IPS [J].
Ding Shijie ;
Zhang Zhiwei ;
Xie Jun .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (06) :8961-8969
[47]   Research on Network Security Situation Awareness Technology based on Artificial Immunity System [J].
Liu Nian ;
Wang Diangang ;
Huang Xuemei ;
Liu Sunjun ;
Zhao Kui .
2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, :472-475
[48]   A Review of Security Attacks on IEC61850 Substation Automation System Network [J].
Rashid, Muhammad Talha Abdul ;
Yussof, Salman ;
Yusoff, Yunus ;
Ismail, Roslan .
PROCEEDINGS OF THE 2014 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MULTIMEDIA (ICIM), 2014, :5-10
[49]   Research on Wireless-Based Intrusion Detection in Mesh Network Security System [J].
Wen, Kaifeng .
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 :38-41
[50]   Dual Feature-Based Intrusion Detection System for IoT Network Security [J].
Biju, A. ;
Franklin, S. Wilfred .
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2025, 18 (01)