{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T01:05:33Z","timestamp":1770167133207,"version":"3.49.0"},"reference-count":15,"publisher":"SAGE Publications","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2020,12,4]]},"abstract":"<jats:p>With the spread of the COVID-19 epidemic, the government has put forward higher requirements for network security and reliability through the flow of network managers and the release of information. Traditional intrusion detection technology and firewall technology cannot effectively defend against DDoS attacks. This paper analyzes the principles and defects of intrusion detection system and firewall. In this paper, the architecture design of intrusion prevention system which integrates audit and network defense functions is proposed. The system optimizes the detection and analysis component of detecting attack behavior according to the special requirements of attack defense task, and adds the module of attack behavior characteristic analysis and defense strategy generation. The policy execution component uses a special defense engine to execute defense policies, providing the system with deep defense capabilities. Experiments show that the validity and reliability of the key modules in the proposed defense model meet the technical requirements. It has a certain reference value to improve the reliability of network management system under the influence of COVID-19 epidemic situation.<\/jats:p>","DOI":"10.3233\/jifs-189294","type":"journal-article","created":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T12:46:47Z","timestamp":1600433207000},"page":"8961-8969","source":"Crossref","is-referenced-by-count":3,"title":["Network security defense model based on firewall and IPS"],"prefix":"10.1177","volume":"39","author":[{"given":"Shijie","family":"Ding","sequence":"first","affiliation":[{"name":"School of Business, Suzhou University, Suzhou, Anhui, China"}]},{"given":"Zhiwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Suzhou University, Suzhou, Anhui, China"}]},{"given":"Jun","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Business, Suzhou University, Suzhou, Anhui, China"}]}],"member":"179","reference":[{"issue":"12","key":"10.3233\/JIFS-189294_ref1","doi-asserted-by":"crossref","first-page":"2168","DOI":"10.1111\/risa.12064","article-title":"Global Maize Trade and Food Security: Implications from a Social Network Model","volume":"33","author":"Wu","year":"2013","journal-title":"Risk Analysis"},{"issue":"4","key":"10.3233\/JIFS-189294_ref2","first-page":"564","article-title":"Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)","volume":"64","author":"Netze","year":"2011","journal-title":"American Journal of Orthopsychiatry"},{"issue":"3","key":"10.3233\/JIFS-189294_ref3","first-page":"313","article-title":"RINSE: The Real-Time Immersive Network Simulation Environment for network security exercises (extended, version)","volume":"47","author":"Liljenstam","year":"2007","journal-title":"Operations Research"},{"issue":"4","key":"10.3233\/JIFS-189294_ref4","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MC.2018.2141032","article-title":"Game-Model-Based Network Security Risk Control","volume":"51","author":"Ni","year":"2018","journal-title":"Computer"},{"issue":"3","key":"10.3233\/JIFS-189294_ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3311888","article-title":"Naming Content on the Network Layer: A Security Analysis of the Information-Centric Network Model","volume":"52","author":"Mannes","year":"2019","journal-title":"ACM Computing Surveys"},{"key":"10.3233\/JIFS-189294_ref6","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1016\/j.ssci.2019.06.004","article-title":"Stochastic model for emotion contagion in social networks security based on machine learning","volume":"118","author":"Fei","year":"2019","journal-title":"Safety Science"},{"issue":"1","key":"10.3233\/JIFS-189294_ref7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/JIFS-179064","article-title":"Intelligent system for products personalization and design using genetic algorithm","volume":"37","author":"Xue","year":"2019","journal-title":"Journal of Intelligent and Fuzzy Systems"},{"issue":"01","key":"10.3233\/JIFS-189294_ref8","first-page":"166","article-title":"Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction","volume":"28","author":"Guang","year":"2019","journal-title":"Chinese Journal of Electronics"},{"issue":"JUL.","key":"10.3233\/JIFS-189294_ref9","first-page":"166","article-title":"Abnormal detection method of industrial control system based on behavior model","volume":"84","author":"Lai","year":"2019","journal-title":"Computers & Security"},{"issue":"MAR.","key":"10.3233\/JIFS-189294_ref10","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.adhoc.2018.09.014","article-title":"Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device","volume":"84","author":"Feng","year":"2019","journal-title":"Ad-hoc Networks"},{"issue":"AUG.","key":"10.3233\/JIFS-189294_ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jcss.2017.11.004","article-title":"The relationship between extra connectivity and conditional diagnosability of regular graphs under the PMC model","volume":"95","author":"Lin","year":"2018","journal-title":"Journal of Computer and System Sciences"},{"issue":"4","key":"10.3233\/JIFS-189294_ref12","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1007\/s11036-018-1003-5","article-title":"The Individual Identification Method of Wireless Device Based on A Robust Dimensionality Reduction Model of Hybrid Feature Information","volume":"23","author":"Han","year":"2018","journal-title":"Mobile Networks & Applications"},{"issue":"01","key":"10.3233\/JIFS-189294_ref13","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1142\/S021800142059003X","article-title":"An Intelligent Security Defensive Model of SCADA Based on Multi-Agent in Oil and Gas Fields","volume":"34","author":"Yang","year":"2020","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"issue":"3","key":"10.3233\/JIFS-189294_ref14","first-page":"581","article-title":"The Role of Security Concerns in the Failure of the Annan Plan and in the Post-Annan Plan Period","volume":"5","author":"Faustman","year":"2018","journal-title":"Geoscientific Model Development"},{"issue":"8","key":"10.3233\/JIFS-189294_ref15","doi-asserted-by":"crossref","first-page":"1559","DOI":"10.1111\/risa.12966","article-title":"Security Investment in Contagious Networks","volume":"38","author":"Hasheminasab","year":"2018","journal-title":"Risk Analysis"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-189294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T12:55:15Z","timestamp":1770123315000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-189294"}},"subtitle":[],"editor":[{"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,4]]},"references-count":15,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.3233\/jifs-189294","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,4]]}}}