Skip to main content

Research on Redirect Technology Based on Interest Association Rules in NAT

  • Conference paper
Advances in Computer Science, Environment, Ecoinformatics, and Education (CSEE 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 217))

  • 1047 Accesses

Abstract

For lack of resources for IP address and the Network attack become diversity, the NAT technology is used for address extension. So, the requirement of Network security is improved. This paper mainly research on the security policy of NAT, and proposes Intrusion Redirect, protection of the Network effectively. Base on Apriori mining, proposes Interest association rules for the IDS Intrusion log database mining, the threat network access will be redirected to a specific environment, through the highly interactive among the access rules database and firewall rules, and IDS log database, the network defense initiative has improved, to achieve the double protection for the network with the NAT and Firewall technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ye, X., Liu, H.-z., Li, W.-z.: Studyon Honeypot based on Network Monitoring. Computer Science 9, 155–158 (2010) (in Chinese)

    Google Scholar 

  2. Liu, F.-h., Ding, H.-l., Zhang, Y.-p.: Research and application of NAT technique. Computer Engineering and Design 5, 1814-1817 (2006) (in Chinese)

    Google Scholar 

  3. Chen, M.-f., Jiang, C.-g.: The Realization of NAT and the Application in Firewall. Control and Automation Publication Group (18), 68–69 (2002) (in Chinese)

    Google Scholar 

  4. He, S., Liang, X.-m.: The analysis of NAT technology and the Application in the Firewall. Control and Automation Publication Group (21), 167–168 (2005) (in Chinese)

    Google Scholar 

  5. Lu, T.-f., Chen, Z.-j., Zhuge, J.-w.: Research and Implementation of Network Attack Flow Redirection Mechanism in the Honeyfarm Environment. Journal of Nanjing University of Posts and Telecommunications (29), 14–20 (2009) (in Chinese)

    Google Scholar 

  6. Lu, L.-n., Chen, Y.-p., Wei, H.-y.: Research on Apriori Algorithm in Mining Association Rules. Mini-Micro System 12(3), 940–943 (2006) (in Chinese)

    Google Scholar 

  7. Zhang, X.-x., Wang, Y.-q.: Correlation-Based Interestness Association Rules Mining. Computer Engineering and Science 25(3), 60–62 (2006) (in Chinese)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, H., Ye, X. (2011). Research on Redirect Technology Based on Interest Association Rules in NAT. In: Lin, S., Huang, X. (eds) Advances in Computer Science, Environment, Ecoinformatics, and Education. CSEE 2011. Communications in Computer and Information Science, vol 217. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23339-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23339-5_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23338-8

  • Online ISBN: 978-3-642-23339-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics