A Firewall Policy Anomaly Detection Framework for Reliable Network Security

被引:16
|
作者
Togay, Cengiz [1 ]
Kasif, Ahmet [2 ]
Catal, Cagatay [3 ]
Tekinerdogan, Bedir [4 ]
机构
[1] Uludag Univ, Dept Comp Engn, TR-16059 Bursa, Turkey
[2] Bursa Tech Univ, Dept Comp Engn, TR-16310 Bursa, Turkey
[3] Qatar Univ, Dept Comp Sci & Engn, Doha 2713, Qatar
[4] Wageningen Univ & Res, Informat Technol Grp, NL-6708 PB Wageningen, Netherlands
关键词
Anomaly detection; Security; IP networks; Firewalls (computing); Shadow mapping; Redundancy; Correlation; firewall policy; logic programming; network security; packet filtering; security; CLASSIFICATION;
D O I
10.1109/TR.2021.3089511
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One of the key challenges in computer networks is network security. For securing the network, various solutions have been proposed, including network security protocols and firewalls. In the case of so-called packet-filtering firewalls, policy rules are implemented to monitor changes to the network and preserve the required security level. Due to the dramatic increase of devices, however, and herewith the rapid increase of the size of the policy rules, firewall policy anomalies occur more frequently. This requires careful implementation of the policy rules to ensure cost-efficient solutions for anomaly detection to support network security. In this study, we present an anomaly detection framework for detecting intrafirewall policy anomaly rules. The framework supports the simulation of packets through the firewall ruleset for validating and enhancing the security level of the network. The framework is validated using four different types of firewall policy anomalies. Experimental results demonstrate that the framework is effective and efficient in detecting firewall policy anomalies.
引用
收藏
页码:339 / 347
页数:9
相关论文
共 50 条
  • [1] Firewall Log Analysis and Dynamic Rule Re-ordering in Firewall Policy Anomaly Management Framework
    Lubna, K.
    Cyiac, Robin
    Karun, Kavitha A.
    [J]. 2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 853 - 856
  • [2] Practical firewall policy inspection using anomaly detection and its visualization
    Kim, Ui-Hyong
    Kang, Jung-Min
    Lee, Jae-Sung
    Kim, Hyong-Shik
    Jung, Soon-Young
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 71 (02) : 627 - 641
  • [3] Practical firewall policy inspection using anomaly detection and its visualization
    Ui-Hyong Kim
    Jung-Min Kang
    Jae-Sung Lee
    Hyong-Shik Kim
    Soon-Young Jung
    [J]. Multimedia Tools and Applications, 2014, 71 : 627 - 641
  • [4] An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP Solver
    Yin, Yi
    Tateiwa, Yuichiro
    Wang, Yun
    Katayama, Yoshiaki
    Takahashi, Naohisa
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 147 - 161
  • [5] On ubiquitous network security and anomaly detection
    Van Dyke, C
    Koc, CK
    [J]. 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 374 - 378
  • [6] Reliable Security Policy in Mobile Distributed Network
    Suganthi, Bhuvana D.
    Manjuath, R.
    Aravindan, A.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1782 - 1786
  • [7] Network Security and Anomaly Detection with Big-DAMA, a Big Data Analytics Framework
    Casas, Pedro
    Soro, Francesca
    Vanerio, Juan
    Settanni, Giuseppe
    D'Alconzo, Alessandro
    [J]. PROCEEDINGS OF THE 2017 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2017, : 16 - 22
  • [8] System and Network Security: Anomaly Detection and Monitoring
    Vadursi, Michele
    Ceccarelli, Andrea
    Duarte, Elias P., Jr.
    Mahanti, Aniket
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016 (2016)
  • [9] An anomaly detection framework for cyber-security data
    Evangelou, Marina
    Adams, Niall M.
    [J]. COMPUTERS & SECURITY, 2020, 97
  • [10] A BasisEvolution framework for network traffic anomaly detection
    Xia, Hui
    Fang, Bin
    Roughan, Matthew
    Cho, Kenjiro
    Tune, Paul
    [J]. COMPUTER NETWORKS, 2018, 135 : 15 - 31