Cargando…

Ant colony optimization-based firewall anomaly mitigation engine

A firewall is the most essential component of network perimeter security. Due to human error and the involvement of multiple administrators in configuring firewall rules, there exist common anomalies in firewall rulesets such as Shadowing, Generalization, Correlation, and Redundancy. There is a need...

Descripción completa

Detalles Bibliográficos
Autores principales: Penmatsa, Ravi Kiran Varma, Vatsavayi, Valli Kumari, Samayamantula, Srinivas Kumar
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4938840/
https://www.ncbi.nlm.nih.gov/pubmed/27441151
http://dx.doi.org/10.1186/s40064-016-2489-6
_version_ 1782441912227069952
author Penmatsa, Ravi Kiran Varma
Vatsavayi, Valli Kumari
Samayamantula, Srinivas Kumar
author_facet Penmatsa, Ravi Kiran Varma
Vatsavayi, Valli Kumari
Samayamantula, Srinivas Kumar
author_sort Penmatsa, Ravi Kiran Varma
collection PubMed
description A firewall is the most essential component of network perimeter security. Due to human error and the involvement of multiple administrators in configuring firewall rules, there exist common anomalies in firewall rulesets such as Shadowing, Generalization, Correlation, and Redundancy. There is a need for research on efficient ways of resolving such anomalies. The challenge is also to see that the reordered or resolved ruleset conforms to the organization’s framed security policy. This study proposes an ant colony optimization (ACO)-based anomaly resolution and reordering of firewall rules called ACO-based firewall anomaly mitigation engine. Modified strategies are also introduced to automatically detect these anomalies and to minimize manual intervention of the administrator. Furthermore, an adaptive reordering strategy is proposed to aid faster reordering when a new rule is appended. The proposed approach was tested with different firewall policy sets. The results were found to be promising in terms of the number of conflicts resolved, with minimal availability loss and marginal security risk. This work demonstrated the application of a metaheuristic search technique, ACO, in improving the performance of a packet-filter firewall with respect to mitigating anomalies in the rules, and at the same time demonstrated conformance to the security policy.
format Online
Article
Text
id pubmed-4938840
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher Springer International Publishing
record_format MEDLINE/PubMed
spelling pubmed-49388402016-07-20 Ant colony optimization-based firewall anomaly mitigation engine Penmatsa, Ravi Kiran Varma Vatsavayi, Valli Kumari Samayamantula, Srinivas Kumar Springerplus Research A firewall is the most essential component of network perimeter security. Due to human error and the involvement of multiple administrators in configuring firewall rules, there exist common anomalies in firewall rulesets such as Shadowing, Generalization, Correlation, and Redundancy. There is a need for research on efficient ways of resolving such anomalies. The challenge is also to see that the reordered or resolved ruleset conforms to the organization’s framed security policy. This study proposes an ant colony optimization (ACO)-based anomaly resolution and reordering of firewall rules called ACO-based firewall anomaly mitigation engine. Modified strategies are also introduced to automatically detect these anomalies and to minimize manual intervention of the administrator. Furthermore, an adaptive reordering strategy is proposed to aid faster reordering when a new rule is appended. The proposed approach was tested with different firewall policy sets. The results were found to be promising in terms of the number of conflicts resolved, with minimal availability loss and marginal security risk. This work demonstrated the application of a metaheuristic search technique, ACO, in improving the performance of a packet-filter firewall with respect to mitigating anomalies in the rules, and at the same time demonstrated conformance to the security policy. Springer International Publishing 2016-07-08 /pmc/articles/PMC4938840/ /pubmed/27441151 http://dx.doi.org/10.1186/s40064-016-2489-6 Text en © The Author(s) 2016 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
spellingShingle Research
Penmatsa, Ravi Kiran Varma
Vatsavayi, Valli Kumari
Samayamantula, Srinivas Kumar
Ant colony optimization-based firewall anomaly mitigation engine
title Ant colony optimization-based firewall anomaly mitigation engine
title_full Ant colony optimization-based firewall anomaly mitigation engine
title_fullStr Ant colony optimization-based firewall anomaly mitigation engine
title_full_unstemmed Ant colony optimization-based firewall anomaly mitigation engine
title_short Ant colony optimization-based firewall anomaly mitigation engine
title_sort ant colony optimization-based firewall anomaly mitigation engine
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4938840/
https://www.ncbi.nlm.nih.gov/pubmed/27441151
http://dx.doi.org/10.1186/s40064-016-2489-6
work_keys_str_mv AT penmatsaravikiranvarma antcolonyoptimizationbasedfirewallanomalymitigationengine
AT vatsavayivallikumari antcolonyoptimizationbasedfirewallanomalymitigationengine
AT samayamantulasrinivaskumar antcolonyoptimizationbasedfirewallanomalymitigationengine