首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机的应用论文--计算机网络论文--一般性问题论文

Implementation Firewall Combined with IPS to Prevent Dos/Malicious Attack

ABSTRACT第5-6页
摘要第7-11页
TABLE OF CONTENTS第11-15页
LIST OF FIGURES第15-16页
LIST OF TABLES第16-17页
CHAPTER 1 INTRODUCTION第17-22页
    1.1 Problem Statement第17-18页
    1.2 Motivation第18-19页
    1.3 Research Focus and Achievements第19-21页
    1.4 Thesis outline第21-22页
CHAPTER 2 BACKGROUND AND PREVIOUS WORKS第22-42页
    2.1 Firewall Basic第22-25页
        2.1.1 Manage and Control Network Traffic (MCNT)第23页
        2.1.2 Firewalls Authenticate Access (FAA)第23-24页
        2.1.3 Act as an intermediary第24页
        2.1.4 Protect resources第24-25页
        2.1.5 Record and report on event第25页
    2.2 Type of Firewall第25-29页
        2.2.1 Packet Filtering Firewall第26-27页
        2.2.2 Circuit Level Gateway第27-28页
        2.2.3 Application Gateway第28-29页
    2.3 Network Address Translation (NAT)第29-30页
    2.4 Port address translation (PAT)第30-31页
    2.5 What's the Difference between NAT and PAT第31-32页
    2.6 Internet Protocol Security (IPSec)第32-33页
    2.7 Virtual Private Network (VPN)第33-34页
    2.8 Demilitarized Zone (DMZ)第34-36页
        2.8.1 Three-pronged firewalls第34-35页
        2.8.2 Multiple firewall DMZs第35-36页
    2.9 Basic Component of IPS第36页
    2.10 IPS Capabilities第36-37页
        2.10.1 Attack prevention第36页
        2.10.2 Regulatory compliance第36-37页
    2.11 Categorization of IPS第37-38页
        2.11.1 Network-based intrusion prevention system (NIPS)第37页
        2.11.2 Host-based intrusion prevention system(HIPS)第37页
        2.11.3 Network behavior analysis (NBA)第37页
        2.11.4 Wireless intrusion prevention systems (WIPS)第37-38页
    2.12 Deploying IPS第38-40页
        2.12.1 Host IPS第38页
        2.12.2 Network IPS第38-40页
    2.13 Previous works第40-42页
CHAPTER 3 SOLUTION AND METHOLOGY第42-62页
    3.1 Testing Environment第42-43页
    3.2 Methodology第43-44页
    3.3 Prevention Attack solution第44-62页
        3.3.1 Protecting form TCP SYN Attacks第44-47页
        3.3.2 IP Spoofing Attack第47-48页
        3.3.3 Smurf attacks第48-54页
        3.3.4 Configuration to protection against DDoS第54-62页
CHAPTER 4 IMPLEMENTATION FIREWALL COMBINED WITHIPS第62-111页
    4.1 Firewall Configuration第62-64页
    4.2 NAT Configuration第64-99页
        4.2.1 Dynamic NAT/PAT Overload第65-72页
        4.2.2 Dynamic Policy NAT/PAT第72-78页
        4.2.3 Dynamic NAT/PAT And Policy NAT/PAT Combined第78-84页
        4.2.4 Static/Policy NAT, Port Translation/Many to Many Static NAT第84-92页
        4.2.5 Double NAT/Source Destination NAT第92-99页
    4.3 Cisco IPS Configuration第99-111页
        4.3.1 Getting Started Configuration Steps第99-107页
        4.3.2 Advanced Configuration Options第107-111页
CONCLUSION第111-115页
REFERENCES第115-121页
ACKNOWLEDGEMENTS第121页

论文共121页,点击 下载论文
上一篇:windows XP下基于SPI技术防火墙的设计与实现
下一篇:基于计算机视觉的钢材表面缺陷检测系统的研究