AI-Based Approach to Firewall Rule Refinement on High-Performance Computing Service Network

被引:2
作者
Lee, Jae-Kook [1 ]
Hong, Taeyoung [1 ]
Lee, Gukhua [1 ]
机构
[1] Korea Inst Sci & Technol Informat, Natl Supercomp Ctr, 245 Daehak Ro, Daejeon 34141, South Korea
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 11期
关键词
network security; machine learning; deep learning; firewall; rule management; high-performance computing service network; MODEL;
D O I
10.3390/app14114373
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
High-performance computing (HPC) relies heavily on network security, particularly when supercomputing services are provided via public networks. As supercomputer operators, we introduced several security devices, such as anti-DDoS, intrusion prevention systems (IPSs), firewalls, and web application firewalls, to ensure the secure use of supercomputing resources. Potential threats are identified based on predefined security policies and added to the firewall rules for access control after detecting abnormal behavior through anti-DDoS, IPS, and system access logs. After analyzing the status change patterns for rule policies added owing to human errors among these added firewall log events, 289,320 data points were extracted over a period of four years. Security experts and operators must go through a strict verification process to rectify policies that were added incorrectly owing to human error, which adds to their workload. To address this challenge, our research applies various machine- and deep-learning algorithms to autonomously determine the normalcy of detection without requiring administrative intervention. Machine-learning algorithms, including na & iuml;ve Bayes, K-nearest neighbor (KNN), OneR, a decision tree called J48, support vector machine (SVM), logistic regression, and the implemented neural network (NN) model with the cross-entropy loss function, were tested. The results indicate that the KNN and NN models exhibited an accuracy of 97%. Additional training and feature refinement led to even better improvements, increasing the accuracy to 98%, a 1% increase. By leveraging the capabilities of machine-learning and deep-learning technologies, we have provided the basis for a more robust, efficient, and autonomous network security infrastructure for supercomputing services.
引用
收藏
页数:18
相关论文
共 37 条
[31]  
Saleous H, 2019, INT WIREL COMMUN, P1853, DOI 10.1109/IWCMC.2019.8766576
[32]   On Detecting and Classifying DGA Botnets and their Families [J].
Tong Anh Tuan ;
Long, Hoang Viet ;
Taniar, David .
COMPUTERS & SECURITY, 2022, 113
[33]   The Analysis of Firewall Policy Through Machine Learning and Data Mining [J].
Ucar, Erdem ;
Ozhan, Erkan .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (02) :2891-2909
[34]   A Heuristic Intrusion Detection Approach Using Deep Learning Model [J].
Wu, Ching-seh ;
Chen, Sam .
2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN, 2023, :438-442
[35]   Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey [J].
Wu, Yirui ;
Wei, Dabao ;
Feng, Jun .
SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
[36]   A Hierarchical Intrusion Detection Model Combining Multiple Deep Learning Models With Attention Mechanism [J].
Xu, Hongsheng ;
Sun, Libo ;
Fan, Ganglong ;
Li, Wanxing ;
Kuang, Guofang .
IEEE ACCESS, 2023, 11 :66212-66226
[37]   Improving Classification Performance of Softmax Loss Function Based on Scalable Batch-Normalization [J].
Zhu, Qiuyu ;
He, Zikuang ;
Zhang, Tao ;
Cui, Wennan .
APPLIED SCIENCES-BASEL, 2020, 10 (08)