Research on Firewall System for Confidential Network

Article Preview

Abstract:

To satisfy the special needs of confidential networks, a protection method of combining ingress and egress access control for network boundary security is proposed. In preventing network attacks, a combined mechanism of packets filtering firewall and intrusion detection system based on artificial neural network and rule matching is implemented to increase the accuracy of intrusion detection. In preventing information leakage, techniques of identity authentication and content filtering are integrated into the mechanism of egress access control so that strategies with more flexibility in security auditing and access control can be implemented, which is effective to prevent the sensitive or secret data from leaking out and to trace the source of leakage.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

4279-4283

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Teresa F Lunt. A Survey of Intrusion Detection Techniques, Computers & Security[J], 1993, 12(4): 405-418.

DOI: 10.1016/0167-4048(93)90029-5

Google Scholar

[2] Netfilter, Firewall, NAT an packet filter for Linux[EB/OL], http: /www. Netfilter. org/documentation/index. html.

Google Scholar

[3] Snort, the de facto standard for intrusion detection/prevention[EB/OL], http: /www. snort. org.

Google Scholar

[4] SourceForge. net: The libpcap project[EB/OL], http: /sourceforge. net/projects/libpcap.

Google Scholar

[5] C. Rigney, S. Willens, A. Rubens, W. Simpson, RFC 2865, Remote Authentication Dial In User Service (RADIUS)[EB/OL], June 2000. http: /www. ietf. org/rfc/rfc2865. txt.

DOI: 10.17487/rfc2865

Google Scholar

[6] RFC 2551, Lightweight Directory Access Protocol[EB/OL], http: /www. ietf. org/rfc/rfc2551. txt.

Google Scholar

[7] DAI Kui. Implementation technology of neural network[M],. Changsha: National University of Defense Technology Press, (1998).

Google Scholar

[8] R S Boyer, J S Moore. A Fast String Searching Algorithm[J], Communications of the ACM, 1977, 20: 762-772.

DOI: 10.1145/359842.359859

Google Scholar

[9] He Longtao, Fang Binxing, Humingzeng, Improvement of Boyer-Moore String Matching Algorithm[J], Journal of Computer Applications, 2003, 23(3): 6-9.

Google Scholar