(This paper analyzes the implementation method of Linux firewall and the principle of network intrusion/intrusion prevention system, proposes a scheme of integrated implementation of firewall and network intrusion/intrusion prevention system, and analyzes the data origin, Detection methods and improved response methods.
Integrated implementation plan of firewall and network intrusion/intrusion prevention system.pdf)