An Improved Method of Firewall Policy Anomaly Detection Based on Decision Tree

Article Preview

Abstract:

Anomalous access control policy on firewall reduces the efficiency of the equipment, thus affecting the overall security of the network. This paper introduces an improved method of firewall policy anomaly detection based on decision tree, by transforming all the firewall access control rules into a decision tree to store the information in a tree data structure, each rule corresponds to the only one path of the tree. The experiment results show that this method solves some shortcomings in the existing decision tree based firewall policy anomaly detection methods, avoids spending time on comparison of rules whose attribute domains are uncorrelated and traversal comparison of all rules, reduces its running time and improves the efficiency of anomaly detection.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1925-1930

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Wool A: Computer. Vol. 37 (2004), p.62.

Google Scholar

[2] E. Al-Shaer and H. Hamed: Integrated Network Management. Vol. 22 (2003), p.34.

Google Scholar

[3] Y.B. Zhao and H.M. Zou: Computer Engineering. Vol. 35 (2009), p.109. In Chinese.

Google Scholar

[4] Y. Sun, J.Y. Luo and Y. Liu: Computer Engineering. Vol. 35 (2009), p.164. In Chinese.

Google Scholar

[5] Y.H. Zhao, B. Hu and C.H. Zhou: Formal Description and Verification of Security Filtered Rules, IEEE International Conference on Networking and Distributed Computing, Hangzhou, China, 21-24 October (2010).

DOI: 10.1109/icndc.2010.55

Google Scholar

[6] Y. Xu, T. Dong: Computer Technology and Development. Vol. 23 (2013), p.128 In Chinese.

Google Scholar

[7] E. Al-Shaer and H. Hamed: IEEE Journals, Vol. 23 (2005), p. (2069).

Google Scholar