Font Size: a A A

Based On Rule Transformation Invasion Counter-attack Model

Posted on:2010-09-28Degree:MasterType:Thesis
Country:ChinaCandidate:M ZhangFull Text:PDF
GTID:2178360275995337Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In this paper, the current mainstream of network security technology research and analysis, respectively, described their characteristics and advantages and disadvantages. For now commonly used method of testing to do a more detailed exposition is to find a firewall, intrusion prevention performance in the face of a major problem. And then the specific issue of a series of studies, based on a block attacks, defensive characteristics, to counter the invasion of the principle of the system model. Which discussed the use of several key technologies: intrusion detection rules of conversion, and firewall systems linked to counter-defense engine and the realization of some of the modules. It is an inter-computer testing, multi-level defense, be able to find hidden features such attacks. Not only be able to resist internal and external attacks, the source of the attack to block implementation of the strategy can also take the initiative to counter the source of the attack, which has greatly enhanced the performance of intrusion prevention and effective.In this paper, the counter-invasion defense system, this is a new means of network security, intrusion prevention system with the existing biggest difference is that it will attack the source of computer networks to counter the initiative was launched, this article is an innovative, Has a very significant social benefits.The article accompanied by a tail of the firewall, intrusion prevention system to counter the console source, the system can hostnetwork and an effective role in protection.
Keywords/Search Tags:firewall, Rule transformation, intrusion prevention, intrusion counterattack
PDF Full Text Request
Related items