Firewall Anomaly Detection Based on Double Decision Tree

被引:1
|
作者
Lin, Zhiming [1 ]
Yao, Zhiqiang [1 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350100, Peoples R China
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 12期
基金
中国国家自然科学基金;
关键词
firewall; double decision tree; anomaly detection; POLICY;
D O I
10.3390/sym14122668
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
To solve the problems regarding how to detect anomalous rules with an asymmetric structure, which leads to the firewall not being able to control the packets in and out according to the administrator's idea, and how to carry out an incremental detection efficiently when the new rules are added, anomaly detection algorithms based on an asymmetric double decision tree were considered. We considered the packet filter, the most common and used type of First Matching Rule, for the practical decision space of each rule and the whole policy. We adopted, based on the asymmetric double decision tree detection model, the policy equivalent decision tree and the policy decision tree of anomalies. Therefore, we can separate the policy's effective decision space and the anomalous decision space. Using the separated decision trees can realize the optimization of the original policy and the faster incremental detection when adding new rules and generating a detailed report. The simulation results demonstrate that the proposed algorithms are superior to the other decision tree algorithms in detection speed and can achieve incremental detection. The results demonstrate that our approach can save about 33% of the time for complete detection compared with the other approaches, and the time of incremental anomaly detection compared to complete detection is about 90% of the time saved in a complex policy.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Intra Firewall Anomaly Policies Detection in Cloud Environment Using Firewall Tree
    Dhwani Hakani
    Palvinder Singh Mann
    Transactions of the Indian National Academy of Engineering, 2025, 10 (1) : 63 - 72
  • [2] Triples Anomaly Detection Security Model Based on Decision Tree
    Lin, Liangcheng
    Qing, Song
    Jiang, Ting
    Zhou, Leiyue
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 2350 - 2356
  • [3] Anomaly Behavior Detection Based on Ensemble Decision Tree in Power Distribution Network
    Wang, Dian-Gang
    Dong, Jin-Chen
    Huang, Lin
    Gong, Yan
    2018 4TH ANNUAL INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC 2018), 2018, : 312 - 316
  • [4] An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree
    Radoglou-Grammatikis, Panagiotis I.
    Sarigiannidis, Panagiotis G.
    2018 GLOBAL INFORMATION INFRASTRUCTURE AND NETWORKING SYMPOSIUM (GIIS), 2018,
  • [5] Anomaly detection model based on gradient boosting and decision tree for IoT environments security
    Douiba M.
    Benkirane S.
    Guezzaz A.
    Azrour M.
    Journal of Reliable Intelligent Environments, 2023, 9 (04) : 421 - 432
  • [6] Financial Data Anomaly Detection Method Based on Decision Tree and Random Forest Algorithm
    Zhang, Qingyang
    JOURNAL OF MATHEMATICS, 2022, 2022
  • [7] System anomaly detection: Mining firewall logs
    Winding, Robert
    Wright, Timothy
    Chapple, Michael
    2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +
  • [8] Binary Decision Tree Based Packet Queuing Schema for Next Generation Firewall
    Patel, Manthan
    Amritha, P. P.
    ADVANCES IN COMPUTING AND DATA SCIENCES, PT I, 2021, 1440 : 224 - 233
  • [9] Enhanced Tree-Based Anomaly Detection
    Karczmarek, Pawel
    Galka, Lukasz
    Dolecki, Michal
    Pedrycz, Witold
    Czerwinski, Dariusz
    Kiersztyn, Adam
    Stegierski, Rafal
    2022 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2022,
  • [10] Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection
    Aguilar, Diana Laura
    Medina-Perez, Miguel Angel
    Loyola-Gonzalez, Octavio
    Choo, Kim-Kwang Raymond
    Bucheli-Susarrey, Edoardo
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1048 - 1059