Ant colony optimization-based firewall anomaly mitigation engine

作者: Ravi Kiran Varma Penmatsa , Valli Kumari Vatsavayi , Srinivas Kumar Samayamantula

DOI: 10.1186/S40064-016-2489-6

关键词:

摘要: A firewall is the most essential component of network perimeter security. Due to human error and involvement multiple administrators in configuring rules, there exist common anomalies rulesets such as Shadowing, Generalization, Correlation, Redundancy. There a need for research on efficient ways resolving anomalies. The challenge also see that reordered or resolved ruleset conforms organization’s framed security policy. This study proposes an ant colony optimization (ACO)-based anomaly resolution reordering rules called ACO-based mitigation engine. Modified strategies are introduced automatically detect these minimize manual intervention administrator. Furthermore, adaptive strategy proposed aid faster when new rule appended. approach was tested with different policy sets. results were found be promising terms number conflicts resolved, minimal availability loss marginal risk. work demonstrated application metaheuristic search technique, ACO, improving performance packet-filter respect mitigating at same time conformance

参考文章(33)
P. Ravi Kiran Varma, V. Valli Kumari, S. Srinivas Kumar, A novel rough set attribute reduction based on ant colony optimisation International Journal of Intelligent Systems Technologies and Applications. ,vol. 14, pp. 330- 353 ,(2015) , 10.1504/IJISTA.2015.074333
Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham, Detection and resolution of anomalies in firewall policy rules Lecture Notes in Computer Science. pp. 15- 29 ,(2006) , 10.1007/11805588_2
M. Dorigo, Optimization, Learning and Natural Algorithms Ph.D. Thesis, Politecnico di Milano, Italy. ,(1992)
M. Birattari, T. Stutzle, M. Dorigo, Ant Colony Optimization ,(2004)
Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula, Formal approach for managing firewall misconfigurations research challenges in information science. pp. 1- 10 ,(2014) , 10.1109/RCIS.2014.6861044
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni, Detecting and Resolving Firewall Policy Anomalies IEEE Transactions on Dependable and Secure Computing. ,vol. 9, pp. 318- 331 ,(2012) , 10.1109/TDSC.2012.20
Nizar Ben Neji, Adel Bouhoula, Towards safe and optimal filtering rule reordering for complex packet filters network and system security. pp. 153- 160 ,(2011) , 10.1109/ICNSS.2011.6059995
Avishai Wool, Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese IEEE Internet Computing. ,vol. 14, pp. 58- 65 ,(2010) , 10.1109/MIC.2010.29
Mohammed Anis Benelbahri, Adel Bouhoula, Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules international symposium on computers and communications. pp. 63- 70 ,(2007) , 10.1109/ISCC.2007.4381486