Please wait a minute...
  2009, Vol. 1 Issue (4): 61-63    DOI:
应用技术与研究 Current Issue | Archive | Adv Search |
A Case Study:Use Firewall,IDS and IPS to build a Enterprise-class Security System
Huang Weili
(College of Computer Science and Engineering. South China University of Technology,Guangzhou 510006,Guangdong)
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract   In this paper,we introduced 3 types of security technologies here,firewall,IDS and IPS,and discuss their advantages and drawbacks.In our case study,to overcome their drawbacks,we adapt the layered security framework to combine the 3 technologies to build a strong enough security system.For the business application,the cost effectiveness is vey import,so in our case, we show how to use free resources to build that cost effective system,and also we introduce a method on testing an IPS product,the result shows that our method is valuable and cost effective.
Key words Firewall      IDS      IPS      layered security     
Received: 01 January 1900      Published: 10 April 2009

Cite this article:

Huang Weili. A Case Study:Use Firewall,IDS and IPS to build a Enterprise-class Security System. , 2009, 1(4): 61-63.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2009/V1/I4/61

[1] XIE Feng MENG Jin DING Wei REN Zhao-peng . Overview of Network Structure Transformation and Network Security Construction Based on MajorActivities Guarantee[J]. 电脑与电信, 2020, 1(6): 57-62.
[2] YAN Jing-jing. Analysis on IDSPE Teaching Model Based on the Cultivation of Autonomic Learning Ability[J]. 电脑与电信, 2019, 1(6): 67-69.
[3] YE Zheng-qiang , LI Jia . Design and Deployment of Enterprise Network Security Scheme[J]. 电脑与电信, 2018, 1(1-2): 53-54.
[4] LI Yan-mei. An Improvement Algorithm Based on Global K- means Clustering[J]. 电脑与电信, 2017, 1(11): 25-27.
[5] GUAN Hu-lin. Configuration and Implementation of Campus Network Firewall[J]. 电脑与电信, 2017, 1(11): 95-97.
[6] Zhai Pengxiang, Xu Xiaodan. Research on Studio-Based Modern Apprenticeship Teaching Mode of Software Specialty[J]. 电脑与电信, 2016, 1(9): 28-30.
[7] Cui Aiguo. Network Security Technology under INTRANET Based on Intelligent Firewall[J]. 电脑与电信, 2016, 1(9): 33-35.
[8] Yang Liu. The Application of Intelligent Terminal Data Transmission System Based on Bluetooth[J]. 电脑与电信, 2016, 1(12): 41-43.
[9] Shen Lixiang. The Security of Linux Server Deployment[J]. 电脑与电信, 2016, 1(11): 50-52.
[10] Wu Youxiao. Clustering Algorithm Based on Novel Chaotic Particle Swarm Optimization[J]. 电脑与电信, 2016, 1(10): 73-78.
[11] Xue Jian, Qu Shouning. The Application of DAI and IPSG in LAN IP Address Management [J]. 电脑与电信, 2015, 1(3): 71-73.
[12] Yang Pan. Research on the Geological Monitoring Data Visualization Application Based on Eclipse RCP framework Yang Pan[J]. 电脑与电信, 2015, 1(3): 77-84.
[13] Xiong Jianhui Sun Guihuang. Research and Implementation of ISA SERVER in Enterprise Application[J]. , 2011, 1(12): 0-0.
[14] Wang Yulin. Using Ipsec-tools to Build the Enterprise VPN[J]. , 2011, 1(08): 0-0.
[15] Chen Huangwei . E-government Information Security Technology Briefly Reviewed[J]. , 2011, 1(05): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd