Anomaly detection of policies in distributed firewalls using data log analysis

被引:3
|
作者
Andalib, Azam [1 ,2 ]
Babamir, Seyed Morteza [1 ]
机构
[1] Univ Kashan, Dept Software Engn, Kashan, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Rasht Branch, Rasht, Iran
来源
JOURNAL OF SUPERCOMPUTING | 2023年 / 79卷 / 17期
关键词
Anomalous packet; Policy rule; Firewall big data log; Machin learning; CLUSTERING ALGORITHMS; BIG DATA;
D O I
10.1007/s11227-023-05417-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A distributed firewall is a security application that monitors and controls traffic on an organization's network. While centralized firewalls are used against attacks coming from outside a network, distributed firewalls are considered for inside attacks from internal networks such as wireless access and VPN tunnel. Distributed firewalls use policies, which are stated by rules, to find anomalous packets. However, such static rules may be incomplete. In this case, by monitoring firewall logs, the anomalies can be detected. Such logs become big when networks have high traffic, but their hidden knowledge contains valuable information about existing anomalies. In this paper, to detect the anomalies, we extract patterns from big data logs of distributed firewalls using data mining and machine learning. The proposed method is applied to big logs from distributed firewalls in a real security environment, and results are analyzed.
引用
收藏
页码:19473 / 19514
页数:42
相关论文
共 50 条
  • [31] Log Analysis and Prediction for Anomaly Detection in Network Switches
    Nam, Sukhyun
    Jeong, Euidong
    Hong, Jibum
    Yoo, Jae-Hyoung
    Hong, James Won-Ki
    2023 19TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT, CNSM, 2023,
  • [32] A MODEL FOR WEBSITE ANOMALY DETECTION BASED ON LOG ANALYSIS
    Han, Xu
    Lv, Tao
    Wei, Lin
    Wu, Yanyan
    Liu, Jianyi
    Wang, Cong
    2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), 2014, : 604 - 608
  • [33] Computer Log Anomaly Detection Using Frequent Episodes
    Halonen, Perttu
    Miettinen, Markus
    Hatonen, Kimmo
    ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS III, 2009, : 417 - 422
  • [34] Iterative Selection of Categorical Variables for Log Data Anomaly Detection
    Landauer, Max
    Hoeld, Georg
    Wurzenberger, Markus
    Skopik, Florian
    Rauber, Andreas
    COMPUTER SECURITY - ESORICS 2021, PT I, 2021, 12972 : 757 - 777
  • [35] Experience Report: System Log Analysis for Anomaly Detection
    He, Shilin
    Zhu, Jieming
    He, Pinjia
    Lyu, Michael R.
    2016 IEEE 27TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2016, : 207 - 218
  • [36] Performance Evaluation of Anomaly Detection in Imbalanced System Log Data
    Studiawan, Hudan
    Sohel, Ferdous
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 239 - 246
  • [37] Fuzzy CNN Autoencoder for Unsupervised Anomaly Detection in Log Data
    Gorokhov, Oleg
    Petrovskiy, Mikhail
    Mashechkin, Igor
    Kazachuk, Maria
    MATHEMATICS, 2023, 11 (18)
  • [38] Improving Web Application Firewalls through Anomaly Detection
    Betarte, Gustavo
    Gimenez, Eduardo
    Martinez, Rodrigo
    Pardo, Alvaro
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, : 779 - 784
  • [39] Analysis of Policy Anomalies in Distributed Firewalls
    Cheng, Yu-Zhu
    Shi, Qiu-Ying
    International Journal of Network Security, 2022, 24 (04) : 617 - 627
  • [40] Distributed anomaly detection, using cooperative learners and association rule analysis
    Deshmeh, G.
    Rahmati, M.
    INTELLIGENT DATA ANALYSIS, 2008, 12 (04) : 339 - 357