Anomaly detection of policies in distributed firewalls using data log analysis

被引:3
|
作者
Andalib, Azam [1 ,2 ]
Babamir, Seyed Morteza [1 ]
机构
[1] Univ Kashan, Dept Software Engn, Kashan, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Rasht Branch, Rasht, Iran
来源
JOURNAL OF SUPERCOMPUTING | 2023年 / 79卷 / 17期
关键词
Anomalous packet; Policy rule; Firewall big data log; Machin learning; CLUSTERING ALGORITHMS; BIG DATA;
D O I
10.1007/s11227-023-05417-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A distributed firewall is a security application that monitors and controls traffic on an organization's network. While centralized firewalls are used against attacks coming from outside a network, distributed firewalls are considered for inside attacks from internal networks such as wireless access and VPN tunnel. Distributed firewalls use policies, which are stated by rules, to find anomalous packets. However, such static rules may be incomplete. In this case, by monitoring firewall logs, the anomalies can be detected. Such logs become big when networks have high traffic, but their hidden knowledge contains valuable information about existing anomalies. In this paper, to detect the anomalies, we extract patterns from big data logs of distributed firewalls using data mining and machine learning. The proposed method is applied to big logs from distributed firewalls in a real security environment, and results are analyzed.
引用
收藏
页码:19473 / 19514
页数:42
相关论文
共 50 条
  • [21] Deep learning for anomaly detection in log data: A survey
    Landauer, Max
    Onder, Sebastian
    Skopik, Florian
    Wurzenberger, Markus
    MACHINE LEARNING WITH APPLICATIONS, 2023, 12
  • [22] Deep learning for anomaly detection in log data: A survey
    Landauer, Max
    Onder, Sebastian
    Skopik, Florian
    Wurzenberger, Markus
    Machine Learning with Applications, 2023, 12
  • [23] Collective Anomaly Detection Using Big Data Distributed Stream Analytics
    Amen, Bakhtiar
    Grigoris, Antoniou
    2018 14TH INTERNATIONAL CONFERENCE ON SEMANTICS, KNOWLEDGE AND GRIDS (SKG), 2018, : 188 - 195
  • [24] Online anomaly detection using dimensionality reduction techniques for HTTP log analysis
    Juvonen, Antti
    Sipola, Tuomo
    Hamalainen, Timo
    COMPUTER NETWORKS, 2015, 91 : 46 - 56
  • [25] SXAD: Shapely eXplainable AI-Based Anomaly Detection Using Log Data
    Alam, Kashif
    Kifayat, Kashif
    Sampedro, Gabriel Avelino
    Karovic Jr, Vincent
    Naeem, Tariq
    IEEE ACCESS, 2024, 12 : 95659 - 95672
  • [26] General purpose data streaming platform for log analysis, anomaly detection and security protection
    Amori, Francesco
    Antonelli, Stefano
    Ciaschini, Vincenzo
    Falabella, Antonio
    Fattibene, Enrico
    Fornari, Federico
    Lattanzio, Daniele
    Michelotto, Diego
    Morganti, Lucia
    26TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS, CHEP 2023, 2024, 295
  • [27] Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security
    Wurzenberger, Markus
    Hoeld, Georg
    Landauer, Max
    Skopik, Florian
    COMPUTERS & SECURITY, 2024, 137
  • [28] AMiner: A Modular Log Data Analysis Pipeline for Anomaly-based Intrusion Detection
    Landauer, Max
    Wurzenberger, Markus
    Skopik, Florian
    Hotwagner, Wolfgang
    Hoeld, Georg
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (01):
  • [29] VERIFICATION OF DISTRIBUTED FIREWALLS CONFIGURATION VS. SECURITY POLICIES USING ALCQI(D)
    Khakpour, Narges
    Jalili, Saeed
    APPLIED ARTIFICIAL INTELLIGENCE, 2009, 23 (10) : 945 - 975
  • [30] A distributed sensing data anomaly detection scheme
    Yin, Chunyong
    Li, Bo
    Yin, Zhichao
    COMPUTERS & SECURITY, 2020, 97