DocumentCode :
2456890
Title :
Analysis of Firewall Policy Rules Using Data Mining Techniques
Author :
Golnabi, Korosh ; Min, Richard K. ; Khan, Latifur ; Al-Shaer, Ehab
Author_Institution :
Dept. of Comput. Sci., Texas Univ., Dallas, TX
fYear :
2006
fDate :
3-7 April 2006
Firstpage :
305
Lastpage :
315
Abstract :
Firewall is the de facto core technology of today´s network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, costly and inefficient for many large-networked organizations. These firewall rules are mostly custom-designed and hand-written thus in constant need for tuning and validation, due to the dynamic nature of the traffic characteristics, ever-changing network environment and its market demands. One of the main problems that we address in this paper is that how much the firewall rules are useful, up-to-dated, well-organized or efficient to reflect the current characteristics of network traffics. In this paper, we present a set of techniques and algorithms to analysis and manage firewall policy rules: (1) data mining technique to deduce efficient firewall policy rules by mining its network traffic log based on its frequency, (2) filtering-rule generalization (FRG) to reduce the number of policy rules by generalization, and (3) a technique to identify any decaying rule and a set of few dominant rules, to generate a new set of efficient firewall policy rules. The anomaly detection based on the mining exposes many hidden but not detectable by analyzing only the firewall policy rules, resulting in two new types of the anomalies. As a result of these mechanisms, network security administrators can automatically review and update the rules. We have developed a prototype system and demonstrated usefulness of our approaches
Keywords :
Internet; authorisation; data mining; telecommunication security; telecommunication traffic; anomaly detection; data mining techniques; filtering-rule generalization; firewall policy rules; network security; network traffic log; traffic characteristics; Communication system traffic control; Computer errors; Computer network management; Computer science; Data mining; Information security; Internet; Management information systems; Technology management; Telecommunication traffic; data mining; firewall; network security; policy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP
Conference_Location :
Vancouver, BC
ISSN :
1542-1201
Print_ISBN :
1-4244-0142-9
Type :
conf
DOI :
10.1109/NOMS.2006.1687561
Filename :
1687561
Link To Document :
بازگشت