Analysis of firewall policy rules using traffic mining techniques
نویسندگان
چکیده
The firewall is usually the first line of defense in ensuring network security for an organization. However, the management of firewalls has proved to be complex, error-prone, and costly for many large-networks. Manually configured firewall rules can easily contain anomalies and mistakes. Even if the rules are anomaly-free, the presence of defects in the firewall implementation, or the firewall device, may prevent the organization from getting the desired effect. To evaluate the effectiveness of firewall policy and to validate that the firewall correctly implements the rules in the policy, a thorough analysis of network traffic data is required. However, due to the magnitude of traffic log data, and the complexity of the analysis, manual evaluation is very challenging and economically infeasible. In this paper, we tackle this problem by presenting a set of algorithms that simplify this process. By analyzing only the firewall log files, we regenerate the effective firewall rules, i.e., what the firewall is really doing. By comparing this with the original manually defined rules, we can easily find if there is any anomaly in the original rule set, and also if there is any defect in the firewall implementation. In our process, we first reduce the data size by generating primitive firewall rules by mining the firewall network traffic log using packet frequencies (MLF). We then regenerate the firewall rules from the primitive rules by applying the Firewall Rule Regeneration (FRR) algorithm which uses aggregation and a set of heuristics. Our analysis also discovers the decaying rules and dominant rules, which provides information that can be used to improve the firewall filtering performance significantly. Our experiments showed that the effective firewall rules can be regenerated to a high degree of accuracy from a small amount of data. Also, since we are using only log files, and not the actual packet data, there is no risk of exposing any sensitive data.
منابع مشابه
Predicting the Next State of Traffic by Data Mining Classification Techniques
Traffic prediction systems can play an essential role in intelligent transportation systems (ITS). Prediction and patterns comprehensibility of traffic characteristic parameters such as average speed, flow, and travel time could be beneficiary both in advanced traveler information systems (ATIS) and in ITS traffic control systems. However, due to their complex nonlinear patterns, these systems ...
متن کاملFirewall Management for to Resolve the Policy Anomalies
Firewall is a security system for network, that controls the network traffic based on firewall rules. Firewall depends on the policy configuration, but managing that firewall policy is complex. Existing policy analysis tools, such as Firewall Policy Advisor and FIREMAN, they can only detect the policy anomaly cannot resolve these anomalies, and detection time was also increased. Therefore, I re...
متن کاملFirewall Policy Diagram: Structures for Firewall Behavior Comprehension
Communication security and regulatory compliance have made the firewall a vital element for networked computers. They provide the protections between parties that only wish to communicate over an explicit set of channels, expressed through protocols, traveling over a network. These explicit set of channels are described and implemented in a firewall using a set of rules. The firewall implements...
متن کاملOn autonomic optimization of firewall policy organization
Security policies play a critical role in many of the current network security technologies such as firewalls, IPSec and IDS devices. The configuration of these policies not only determines the functionality of such devices, but also substantially affects their performance. The optimization of filtering policy configuration is critically important to provide high performance packet filtering pa...
متن کاملPolicy Mining : a Bottom-Up Approach Toward Network Security Management. (Techniques de rôle mining pour la gestion de politiques de sécurité : application à l'administration de la sécurité réseau)
Today’s corporations rely entirely on their information systems, usually connected to the Internet. Network access control, mainly ensured by firewalls, has become a paramount necessity. Yet, the management of manually configured firewall rules is complex, error prone, and costly for large networks. Using high abstract models such as the Role Based Access Control (RBAC) model has proved to be e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJIPT
دوره 5 شماره
صفحات -
تاریخ انتشار 2010