Development of Reinforcement Learning and Pattern Matching (RLPM) Based Firewall for Secured Cloud Infrastructure

被引:9
作者
Praise, J. Jeya [1 ]
Raj, R. Joshua Samuel [2 ]
Benifa, J. V. Bibal [3 ]
机构
[1] Anna Univ, Chennai, Tamil Nadu, India
[2] Rajaas Engn Coll, Nagercoil, India
[3] Indian Inst Informat Technol, Kottayam, Kerala, India
关键词
Cloud infrastructure; Packet filtering; DPI; Signature generation; Pattern matching; ATTACKS;
D O I
10.1007/s11277-020-07608-4
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cloud computing infrastructure is typically intended to store and deliver sensitive data and high performance computing resources through the internet. As the utility of cloud computing has increased to larger extend because of its sophisticated services, the security breaches also growing proportionately in terms of third party attacks. In order to mitigate the modern security attacks in the cloud environment, the traditional firewall rules and packet filtering methods are absolutely insufficient. Hence, a Deep Packet Inspection based firewall (RLPM) is developed to block the malicious attacks by validating the payload signature of arriving packets. RLPM combines the potential of Reinforcement Learning (RL) and parallel fast pattern matching simultaneously and it converges to an optimal solution at the earliest. RL method efficiently learns the environment and process the payload signature in a parallel manner. A two-way pattern matching algorithm is integrated with RL approach that validates the signature towards attaining the quick decisions. The performance results show that the RLPM is better as compared to the existing methods in terms of Response time, throughput and malicious attack blocking. As the firewall is deployed and tested in a real cloud computing environment, the response time is found to be 10% lesser while throughput is also increased about 10% than the existing state-of-the-art-methods.
引用
收藏
页码:993 / 1018
页数:26
相关论文
共 43 条
[1]   Space efficient deep packet inspection of compressed web traffic [J].
Afek, Yehuda ;
Bremler-Barr, Anat ;
Koral, Yaron .
COMPUTER COMMUNICATIONS, 2012, 35 (07) :810-819
[2]   Multiple-path testing for cross site scripting using genetic algorithms [J].
Ahmed, Moataz A. ;
Ali, Fakhreldin .
JOURNAL OF SYSTEMS ARCHITECTURE, 2016, 64 :50-62
[3]  
Alnafessah A, 2020, CLUSTER COMPUT, V23, P1345, DOI 10.1007/s10586-019-02998-y
[4]  
Amanullah MA, 2020, COMPUTER COMMUNICATI
[5]  
[Anonymous], 2004, P 13 C USENIX SEC S
[6]  
[Anonymous], 2 WAY STRING MATCHIN
[7]  
Benifa J. V. B., 2018, MOBILE NETWORKS APPL
[8]   Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs [J].
Boraten, Travis ;
Kodi, Avinash .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 111 :24-38
[9]   A Survey on malware analysis and mitigation techniques [J].
Chakkaravarthy, S. Sibi ;
Sangeetha, D. ;
Vaidehi, V. .
COMPUTER SCIENCE REVIEW, 2019, 32 :1-23
[10]   A new approach to deploy a self-adaptive distributed firewall [J].
da Costa Junior, Edmilson P. ;
da Silva, Carlos Eduardo ;
Pinheiro, Marcos ;
Sampaio, Silvio .
JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2018, 9