Anomaly detection of policies in distributed firewalls using data log analysis

被引:3
|
作者
Andalib, Azam [1 ,2 ]
Babamir, Seyed Morteza [1 ]
机构
[1] Univ Kashan, Dept Software Engn, Kashan, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Rasht Branch, Rasht, Iran
来源
JOURNAL OF SUPERCOMPUTING | 2023年 / 79卷 / 17期
关键词
Anomalous packet; Policy rule; Firewall big data log; Machin learning; CLUSTERING ALGORITHMS; BIG DATA;
D O I
10.1007/s11227-023-05417-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A distributed firewall is a security application that monitors and controls traffic on an organization's network. While centralized firewalls are used against attacks coming from outside a network, distributed firewalls are considered for inside attacks from internal networks such as wireless access and VPN tunnel. Distributed firewalls use policies, which are stated by rules, to find anomalous packets. However, such static rules may be incomplete. In this case, by monitoring firewall logs, the anomalies can be detected. Such logs become big when networks have high traffic, but their hidden knowledge contains valuable information about existing anomalies. In this paper, to detect the anomalies, we extract patterns from big data logs of distributed firewalls using data mining and machine learning. The proposed method is applied to big logs from distributed firewalls in a real security environment, and results are analyzed.
引用
收藏
页码:19473 / 19514
页数:42
相关论文
共 50 条
  • [41] Access Log Anomaly Detection
    Tharshini, Ma
    Ragavinodini, M.
    Senthilkumar, Radha
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 375 - 381
  • [42] Metric selection and anomaly detection for cloud operations using log and metric correlation analysis
    Farshchi, Mostafa
    Schneider, Jean-Guy
    Weber, Ingo
    Grundy, John
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 : 531 - 549
  • [43] Robust and Transferable Anomaly Detection in Log Data using Pre-Trained Language Models
    Ott, Harold
    Bogatinovski, Jasmin
    Acker, Alexander
    Nedelkoski, Sasho
    Kao, Odej
    2021 IEEE/ACM INTERNATIONAL WORKSHOP ON CLOUD INTELLIGENCE (CLOUDINTELLIGENCE 2021), 2021, : 19 - 24
  • [44] TransSentLog: Interpretable Anomaly Detection Using Transformer and Sentiment Analysis on Individual Log Event
    Pham, Tuan-Anh
    Lee, Jong-Hoon
    IEEE ACCESS, 2023, 11 : 96272 - 96282
  • [45] Anomaly Detection on Interleaved Log Data With Semantic Association Mining on Log-Entity Graph
    Chu, Guojun
    Wang, Jingyu
    Qi, Qi
    Sun, Haifeng
    Zhuang, Zirui
    He, Bo
    Jing, Yuhan
    Zhang, Lei
    Liao, Jianxin
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2025, 51 (02) : 581 - 594
  • [46] Traffic Pattern Analysis for Distributed Anomaly Detection
    Kolaczek, Grzegorz
    Juszczyszyn, Krzysztof
    PARALLEL PROCESSING AND APPLIED MATHEMATICS, PT II, 2012, 7204 : 648 - 657
  • [47] RAGLog: Log Anomaly Detection using Retrieval Augmented Generation
    Pan, Jonathan
    Liang, Wong Swee
    Yidi, Yuan
    2024 IEEE WORLD FORUM ON PUBLIC SAFETY TECHNOLOGY, WFPST 2024, 2024, : 169 - 174
  • [48] Big Log Data Stream Processing: Adapting an Anomaly Detection Technique
    Dietz, Marietheres
    Pernul, Guenther
    DATABASE AND EXPERT SYSTEMS APPLICATIONS (DEXA 2018), PT II, 2018, 11030 : 159 - 166
  • [49] LogKT: Hybrid Log Anomaly Detection Method for Cloud Data Center
    Ou, Xuedong
    Liu, Jing
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 164 - 173
  • [50] Communication Network Anomaly Detection Based on Log File Analysis
    Cheng, Xin
    Wang, Ruizhi
    ROUGH SETS AND KNOWLEDGE TECHNOLOGY, RSKT 2014, 2014, 8818 : 240 - 248