Learning to Customize Network Security Rules
نویسندگان
چکیده
Security is a major concern for organizations who wish to leverage cloud computing. In order to reduce security vulnerabilities, public cloud providers oer rewall functionalities. When properly congured, a rewall protects cloud networks from cyber-aacks. However, proper rewall conguration requires intimate knowledge of the protected system, high expertise and on-going maintenance. As a result, many organizations do not use rewalls eectively, leaving their cloud resources vulnerable. In this paper, we present a novel supervised learning method, and prototype, which compute recommendations for rewall rules. Recommendations are based on sampled network trac meta-data (NetFlow) collected from a public cloud provider. Labels are extracted from rewall congurations deemed to be authored by experts. NetFlow is collected from network routers, avoiding expensive collection from cloud VMs, as well as relieving privacy concerns. e proposed method captures network routines and dependencies between resources and rewall conguration. e method predicts IPs to be allowed by the rewall. A grouping algorithm is subsequently used to generate a manageable number of IP ranges. Each range is a parameter for a rewall rule. We present results of experiments on real data, showing ROC AUC of 0.92, compared to 0.58 for an unsupervised baseline. e results prove the hypothesis that rewall rules can be automatically generated based on router data, and that an automated method can be eective in blocking a high percentage of malicious trac.
منابع مشابه
A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection
A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...
متن کاملINTEGRATED ADAPTIVE FUZZY CLUSTERING (IAFC) NEURAL NETWORKS USING FUZZY LEARNING RULES
The proposed IAFC neural networks have both stability and plasticity because theyuse a control structure similar to that of the ART-1(Adaptive Resonance Theory) neural network.The unsupervised IAFC neural network is the unsupervised neural network which uses the fuzzyleaky learning rule. This fuzzy leaky learning rule controls the updating amounts by fuzzymembership values. The supervised IAFC ...
متن کاملResearch on Redirect Technology Based on Interest Association Rules in NAT
For lack of resources for IP address and the Network attack become diversity, the NAT technology is used for address extension. So, the requirement of Network security is improved. This paper mainly research on the security policy of NAT, and proposes Intrusion Redirect, protection of the Network effectively. Base on Apriori mining, proposes Interest association rules for the IDS Intrusion log ...
متن کاملCreating firewall rules with machine learning techniques
The war against cybercrime is a constant battle. While cyber criminals keep using the same basic attack techniques [M.v.j.], the amount and diversity of malware grows [M. Fossi]. This renders security defenses ineffective such that millions of computers are infected with malware in the form of computer viruses, internet worms and Trojan horses. These cybercrimes cost the society money [G. Lovet...
متن کاملSPARK: Static Program Analysis Reasoning and Retrieving Knowledge
Program analysis is a technique to reason about programs without executing them, and it has various applications in compilers, integrated development environments, and security. In this work, we present a machine learning pipeline that induces a security analyzer for programs by example. The security analyzer determines whether a program is either secure or insecure based on symbolic rules that...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1712.09795 شماره
صفحات -
تاریخ انتشار 2017