Anomaly detection of policies in distributed firewalls using data log analysis

被引:3
|
作者
Andalib, Azam [1 ,2 ]
Babamir, Seyed Morteza [1 ]
机构
[1] Univ Kashan, Dept Software Engn, Kashan, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Rasht Branch, Rasht, Iran
来源
JOURNAL OF SUPERCOMPUTING | 2023年 / 79卷 / 17期
关键词
Anomalous packet; Policy rule; Firewall big data log; Machin learning; CLUSTERING ALGORITHMS; BIG DATA;
D O I
10.1007/s11227-023-05417-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A distributed firewall is a security application that monitors and controls traffic on an organization's network. While centralized firewalls are used against attacks coming from outside a network, distributed firewalls are considered for inside attacks from internal networks such as wireless access and VPN tunnel. Distributed firewalls use policies, which are stated by rules, to find anomalous packets. However, such static rules may be incomplete. In this case, by monitoring firewall logs, the anomalies can be detected. Such logs become big when networks have high traffic, but their hidden knowledge contains valuable information about existing anomalies. In this paper, to detect the anomalies, we extract patterns from big data logs of distributed firewalls using data mining and machine learning. The proposed method is applied to big logs from distributed firewalls in a real security environment, and results are analyzed.
引用
收藏
页码:19473 / 19514
页数:42
相关论文
共 50 条
  • [1] Anomaly detection of policies in distributed firewalls using data log analysis
    Azam Andalib
    Seyed Morteza Babamir
    The Journal of Supercomputing, 2023, 79 : 19473 - 19514
  • [2] Anomaly Detection using Distributed Log Data: A Lightweight Federated Learning Approach
    Guo, Yalan
    Wu, Yulei
    Zhu, Yanchao
    Yang, Bingqiang
    Han, Chunjing
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [3] Policy Anomaly Detection for Distributed IPv6 Firewalls
    Lorenz, Claas
    Schnor, Bettina
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 210 - 219
  • [4] Distributed system anomaly detection using deep learning-based log analysis
    Han, Pengfei
    Li, Huakang
    Xue, Gang
    Zhang, Chao
    COMPUTATIONAL INTELLIGENCE, 2023, 39 (03) : 433 - 455
  • [5] Anomaly Detection and Root Cause Analysis on Log Data
    Pasha, Daem
    Shah, Ali Hussain
    Zadeh, Esmaeil Habib
    Konur, Savas
    ARTIFICIAL INTELLIGENCE XXXIX, AI 2022, 2022, 13652 : 333 - 339
  • [6] Anomaly Detection for Web Log Data Analysis: A Review
    Siwach, Meena
    Mann, Suman
    JOURNAL OF ALGEBRAIC STATISTICS, 2022, 13 (01) : 129 - 148
  • [7] Distributed Systems Anomaly Detection Based on Log
    Lai, Fenggang
    Zhang, Pan
    Cheng, Ruiying
    Xu, Peng
    2021 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM), 2021, : 72 - 79
  • [8] Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
    Fu, Qiang
    Lou, Jian-Guang
    Wang, Yi
    Li, Jiang
    2009 9TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, 2009, : 149 - +
  • [9] Anomaly Detection for Big Log Data Using a Hadoop Ecosystem
    Son, Siwoon
    Gil, Myeong-Seon
    Moon, Yang-Sae
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2017, : 377 - 380
  • [10] Log summarization and anomaly detection for troubleshooting distributed systems
    Gunter, Dan
    Tierney, Brian L.
    Brown, Aaron
    Swany, Martin
    Bresnahan, John
    Schopf, Jennifer M.
    2007 8TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING, 2007, : 41 - +