The Integrated Operation of the Network Security Equipments Based on HTTP

Article Preview

Abstract:

The paper introduces a device linkage system on firewall between the network side and the switch side of user host, and introduces the audit system connected in parallel between the hubs and switches. Then, the paper introduces a method based on HTTP packet recognition network security device linkage, which is a technology of information security intrusion detection and prevention based on the network. It is mainly used to solve the existing network security equipment linkage blocking technology limitation poor problem. Finally, the test result shows that the method is practical and effective.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

3016-3020

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wang yuying, chenping. Combination Timed Colored Petri Net-based Web service modeling, Computer Science, 2010, PP: 152-155.

Google Scholar

[2] Calin Ciufudean, Adrian Graur, Constantin Filote, etc. A new Formalism for Failure Diagnosis: Ant Colony Decision Petri Nets . Journal of software, 2007, PP: 39-46.

DOI: 10.4304/jsw.2.1.39-46

Google Scholar

[3] Sun Yong, Zhang Heng, Ma Yan, ELECTRONICS & IPv6-based intrusion detection and firewall linkage system Computer Engineering, 2008, pp.152-154.

Google Scholar

[4] Zhang Yueguo iron Ling, XUE Zhi, Li Jianhua. Linkage strategy mechanism based on the SNMP protocol network security equipment, information security and confidentiality of communications, 2003, 12: 36-37.

Google Scholar

[5] summer high, Liu Bin for high-speed network intrusion detection system parallel TCP / IP protocol stack. Tsinghua University (Natural Science), 2011, pp.942-948.

Google Scholar

[6] Zhao Xiaoming, Zhang Xinxia based on network information security content audit system and related technology research. Aviation Computing Technology, September 2006, pp.: 127-130.

Google Scholar

[7] Li Mingxing, Heng Ping, Dong Peiwu. Research on artificial neural network method for credit application . Research Information Ltd (RIL) UK, 2004 , pp.127-131.

Google Scholar

[8] James M Varanelli, James P Cohoon. A two-stage simulated annealing methodology . Fifth Great Lakes Symposium on VLSI (GLSVLSI '95). USA: Buffalo, 1995, pp. . 50-53.

DOI: 10.1109/glsv.1995.516023

Google Scholar

[9] Zhang Zhonghui, operation Jia-Qing Liang Yiwen. Linkage mechanism-based intrusion prevention system. computer age in 2006, pp.28-30.

Google Scholar

[10] Ning Haibin. Campus network-based intrusion detection system design and realization . Peking University, (2008).

Google Scholar