Firewall Anomaly Detection Based on Double Decision Tree

被引:1
|
作者
Lin, Zhiming [1 ]
Yao, Zhiqiang [1 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350100, Peoples R China
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 12期
基金
中国国家自然科学基金;
关键词
firewall; double decision tree; anomaly detection; POLICY;
D O I
10.3390/sym14122668
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
To solve the problems regarding how to detect anomalous rules with an asymmetric structure, which leads to the firewall not being able to control the packets in and out according to the administrator's idea, and how to carry out an incremental detection efficiently when the new rules are added, anomaly detection algorithms based on an asymmetric double decision tree were considered. We considered the packet filter, the most common and used type of First Matching Rule, for the practical decision space of each rule and the whole policy. We adopted, based on the asymmetric double decision tree detection model, the policy equivalent decision tree and the policy decision tree of anomalies. Therefore, we can separate the policy's effective decision space and the anomalous decision space. Using the separated decision trees can realize the optimization of the original policy and the faster incremental detection when adding new rules and generating a detailed report. The simulation results demonstrate that the proposed algorithms are superior to the other decision tree algorithms in detection speed and can achieve incremental detection. The results demonstrate that our approach can save about 33% of the time for complete detection compared with the other approaches, and the time of incremental anomaly detection compared to complete detection is about 90% of the time saved in a complex policy.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] An Intrusion Detection Algorithm Based on Decision Tree Technology
    Wang, Juan
    Yang, Qiren
    Ren, Dasen
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 333 - 335
  • [42] A Decision Tree Based Approach for Microgrid Islanding Detection
    Azim, Riyasat
    Zhu, Yongli
    Saleem, Hira Amna
    Sun, Kai
    Li, Fangxing
    Shi, Di
    Sharma, Ratnesh
    2015 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2015,
  • [43] A Method for Duplicate Record Detection Based on Decision Tree
    Lin, Guangyan
    Qian, Yuxiang
    Zhang, Yiqiong
    2016 3RD INTERNATIONAL CONFERENCE ON POWER AND ENERGY SYSTEMS (PES 2016), 2016, 4 : 146 - 150
  • [44] Decision tree-based Design Defects Detection
    Maddeh, Mohamed
    Ayouni, Sarra
    Alyahya, Sultan
    Hajjej, Fahima
    IEEE ACCESS, 2021, 9 : 71606 - 71614
  • [45] Improved edge detection algorithm based on decision tree
    Cai Aiping
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 1080 - 1084
  • [46] Decision Tree Based Android Malware Detection System
    Utku, Anil
    Dogru, Ibrahim Alper
    Akcayol, M. Ali
    2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2018,
  • [47] Anomaly Detection Algorithm Based on Integrated Learning and Bayesian Tree Algorithm
    Wei, Ping
    Zheng, Ya-Ning
    Yao, Wu-Jun
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 274 - 279
  • [48] STREAMRHF: Tree-Based Unsupervised Anomaly Detection for Data Streams
    Nesic, Stefan
    Putina, Andrian
    Bahri, Maroua
    Huet, Alexis
    Navarro, Jose Manuel
    Rossi, Dario
    Sozio, Mauro
    2022 IEEE/ACS 19TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2022,
  • [49] Research on GANomaly Anomaly Detection Method Based on Double Discriminant
    Liu, Yunting
    Tan, Mingxiao
    Gao, Yu
    Dai, Jialin
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2024, 53 (04): : 568 - 575
  • [50] Evaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system
    Chew, Yee Jian
    Ooi, Shih Yin
    Wong, Kok-Seng
    Pang, Ying Han
    Hwang, Seong Oun
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (06) : 5927 - 5937