[1]
Yin Shuming, Research and design of security defense architecture based on firewall and intrusion detection, Changsha: Central South University, Master thesis, (2005).
Google Scholar
[2]
Wang Wenqi, Research on intrusion detection and coordinated-control of security protection, " Xi, an: Northwestern Polytechnical University, Ph. D thesis, (2006).
Google Scholar
[3]
Huseyin Cavusoglu, Srinivasan Raghunathan, Hasan Cavusoglu, Configuration of and interaction between information security technologies: the case of firewalls and intrusion detection systems, Information systems research, 20(2), 2009, pp.198-217.
DOI: 10.1287/isre.1080.0180
Google Scholar
[4]
Baoyi Wang, Haipeng Yang, Shaomin Zhang, Research on application of interaction firewall with IDS in distrbution automation system, Advances in electronic engineering, communication and management Vol. 1, Lecture notes in electrical engineering, Vol. 139, 2012, pp.527-532.
DOI: 10.1007/978-3-642-27287-5_84
Google Scholar
[5]
Jiang Ji, IDS and firewall interaction mechanisms and security protocols, Kunming: Kunming University of Science and Technology, Master thesis, (2006).
Google Scholar
[6]
Wang Baoping, Zhang Zhe, Zhang Xingang, Research of IDS and router coupling based on UPnP and Iptables, Journal of Henan University (Natural Science), 39(4) , 2009, pp.424-427.
Google Scholar
[7]
Dang Rui, Research of interaction between intrusion detection and honeypot, " Xi, an: Northwestern Polytechnical University, Master thesis, (2004).
Google Scholar