Learning to Customize Network Security Rules

نویسندگان

  • Michael Bargury
  • Roy Levin
  • Royi Ronen
چکیده

Security is a major concern for organizations who wish to leverage cloud computing. In order to reduce security vulnerabilities, public cloud providers o‚er €rewall functionalities. When properly con€gured, a €rewall protects cloud networks from cyber-aŠacks. However, proper €rewall con€guration requires intimate knowledge of the protected system, high expertise and on-going maintenance. As a result, many organizations do not use €rewalls e‚ectively, leaving their cloud resources vulnerable. In this paper, we present a novel supervised learning method, and prototype, which compute recommendations for €rewall rules. Recommendations are based on sampled network trac meta-data (NetFlow) collected from a public cloud provider. Labels are extracted from €rewall con€gurations deemed to be authored by experts. NetFlow is collected from network routers, avoiding expensive collection from cloud VMs, as well as relieving privacy concerns. Œe proposed method captures network routines and dependencies between resources and €rewall con€guration. Œe method predicts IPs to be allowed by the €rewall. A grouping algorithm is subsequently used to generate a manageable number of IP ranges. Each range is a parameter for a €rewall rule. We present results of experiments on real data, showing ROC AUC of 0.92, compared to 0.58 for an unsupervised baseline. Œe results prove the hypothesis that €rewall rules can be automatically generated based on router data, and that an automated method can be e‚ective in blocking a high percentage of malicious trac.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

INTEGRATED ADAPTIVE FUZZY CLUSTERING (IAFC) NEURAL NETWORKS USING FUZZY LEARNING RULES

The proposed IAFC neural networks have both stability and plasticity because theyuse a control structure similar to that of the ART-1(Adaptive Resonance Theory) neural network.The unsupervised IAFC neural network is the unsupervised neural network which uses the fuzzyleaky learning rule. This fuzzy leaky learning rule controls the updating amounts by fuzzymembership values. The supervised IAFC ...

متن کامل

Research on Redirect Technology Based on Interest Association Rules in NAT

For lack of resources for IP address and the Network attack become diversity, the NAT technology is used for address extension. So, the requirement of Network security is improved. This paper mainly research on the security policy of NAT, and proposes Intrusion Redirect, protection of the Network effectively. Base on Apriori mining, proposes Interest association rules for the IDS Intrusion log ...

متن کامل

Creating firewall rules with machine learning techniques

The war against cybercrime is a constant battle. While cyber criminals keep using the same basic attack techniques [M.v.j.], the amount and diversity of malware grows [M. Fossi]. This renders security defenses ineffective such that millions of computers are infected with malware in the form of computer viruses, internet worms and Trojan horses. These cybercrimes cost the society money [G. Lovet...

متن کامل

SPARK: Static Program Analysis Reasoning and Retrieving Knowledge

Program analysis is a technique to reason about programs without executing them, and it has various applications in compilers, integrated development environments, and security. In this work, we present a machine learning pipeline that induces a security analyzer for programs by example. The security analyzer determines whether a program is either secure or insecure based on symbolic rules that...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1712.09795  شماره 

صفحات  -

تاریخ انتشار 2017