AI-Based Approach to Firewall Rule Refinement on High-Performance Computing Service Network

被引:2
作者
Lee, Jae-Kook [1 ]
Hong, Taeyoung [1 ]
Lee, Gukhua [1 ]
机构
[1] Korea Inst Sci & Technol Informat, Natl Supercomp Ctr, 245 Daehak Ro, Daejeon 34141, South Korea
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 11期
关键词
network security; machine learning; deep learning; firewall; rule management; high-performance computing service network; MODEL;
D O I
10.3390/app14114373
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
High-performance computing (HPC) relies heavily on network security, particularly when supercomputing services are provided via public networks. As supercomputer operators, we introduced several security devices, such as anti-DDoS, intrusion prevention systems (IPSs), firewalls, and web application firewalls, to ensure the secure use of supercomputing resources. Potential threats are identified based on predefined security policies and added to the firewall rules for access control after detecting abnormal behavior through anti-DDoS, IPS, and system access logs. After analyzing the status change patterns for rule policies added owing to human errors among these added firewall log events, 289,320 data points were extracted over a period of four years. Security experts and operators must go through a strict verification process to rectify policies that were added incorrectly owing to human error, which adds to their workload. To address this challenge, our research applies various machine- and deep-learning algorithms to autonomously determine the normalcy of detection without requiring administrative intervention. Machine-learning algorithms, including na & iuml;ve Bayes, K-nearest neighbor (KNN), OneR, a decision tree called J48, support vector machine (SVM), logistic regression, and the implemented neural network (NN) model with the cross-entropy loss function, were tested. The results indicate that the KNN and NN models exhibited an accuracy of 97%. Additional training and feature refinement led to even better improvements, increasing the accuracy to 98%, a 1% increase. By leveraging the capabilities of machine-learning and deep-learning technologies, we have provided the basis for a more robust, efficient, and autonomous network security infrastructure for supercomputing services.
引用
收藏
页数:18
相关论文
共 37 条
[1]  
Agarwala A, 2020, Arxiv, DOI arXiv:2010.07344
[2]   Low Rate DDoS Detection Using Weighted Federated Learning in SDN Control Plane in IoT Network [J].
Ali, Muhammad Nadeem ;
Imran, Muhammad ;
Din, Muhammad Salah ud ;
Kim, Byung-Seo .
APPLIED SCIENCES-BASEL, 2023, 13 (03)
[3]  
As-Suhbani H.E., 2019, Int. J. Comput. Sci. Eng, V7, P301, DOI [10.26438/ijcse/v7i8.301304, DOI 10.26438/IJCSE/V7I8.301304]
[4]   Economics of Ransomware: Risk Interdependence and Large-Scale Attacks [J].
August, Terrence ;
Dao, Duy ;
Niculescu, Marius Florin .
MANAGEMENT SCIENCE, 2022, 68 (12) :8979-9002
[5]  
Beverly R., 2018, P 3 C TACKL COMP SYS
[6]   A Deep Learning-Based Intrusion Detection and Preventation System for Detecting and Preventing Denial-of-Service Attacks [J].
Canola Garcia, Juan Fernando ;
Taborda Blandon, Gabriel Enrique .
IEEE ACCESS, 2022, 10 :83043-83060
[7]   Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks [J].
Dawadi, Babu R. ;
Adhikari, Bibek ;
Srivastava, Devesh K. .
SENSORS, 2023, 23 (04)
[8]   DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J].
Du, Min ;
Li, Feifei ;
Zheng, Guineng ;
Srikumar, Vivek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1285-1298
[9]  
Ertam F, 2018, 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), P363
[10]   Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center [J].
Ghadermazi, Jalal ;
Shah, Ankit ;
Jajodia, Sushil .
DIGITAL THREATS: RESEARCH AND PRACTICE, 2024, 5 (02)