J4 ›› 2010, Vol. 28 ›› Issue (01): 34-.

Previous Articles     Next Articles

Design and Implementation of Trusted Communication Protocol for Intrusion Prevention System

YUAN Ben-wen, ZHAO Kuo, SUN Ming-di, HU Liang   

  1. 1.Jilin Radio and TV University, Changchun 130022, China;2.College of Computer Science and Technology, Jilin University, Changchun 130012, China
  • Online:2010-01-20 Published:2010-04-06

Abstract:

Intrusion prevention system are mainly based on the correlation between intrusion detection systems and firewalls, and the data format applied to identification and maintenance for both is usually different. These sensitive data are often transmitted in the open network environment, which faced with various security threats. To solve these problems, the trusted communication is introduced.The design and implementation of trusted communication protocol based on XML(eXtensible Markup Language) is provided. Compared to related works, this protocol achieves the implementation of secure data transmission between intrusion detection systems and firewalls in the heterogeneous environments, and scaled to various network security products and network management devices, which contributes to the data fusion among these devices and the detection of distributed network attacks.

Key words: trusted, communication protocol, extensible markup language(XML), transport layer security(TLS), common object request broker architecture(CORBA)

CLC Number: 

  • TP393