|
计算机应用研究 2004
Proxy-based IDS Design and Implementation
|
Abstract:
Beyond conventional protections such as firewall and data encryption, intrusion detection is a new generation protection technique, which can identify and response to malicious acts on computer and network resources. Based on proxy firewall and IDS, this paper designed a proxy-based IDS, which combined the firewall and IDS together, getting over the limitations of individual firewall or IDS,and providing integrated access control, detection and response.