Cargando…
Ant colony optimization-based firewall anomaly mitigation engine
A firewall is the most essential component of network perimeter security. Due to human error and the involvement of multiple administrators in configuring firewall rules, there exist common anomalies in firewall rulesets such as Shadowing, Generalization, Correlation, and Redundancy. There is a need...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4938840/ https://www.ncbi.nlm.nih.gov/pubmed/27441151 http://dx.doi.org/10.1186/s40064-016-2489-6 |
_version_ | 1782441912227069952 |
---|---|
author | Penmatsa, Ravi Kiran Varma Vatsavayi, Valli Kumari Samayamantula, Srinivas Kumar |
author_facet | Penmatsa, Ravi Kiran Varma Vatsavayi, Valli Kumari Samayamantula, Srinivas Kumar |
author_sort | Penmatsa, Ravi Kiran Varma |
collection | PubMed |
description | A firewall is the most essential component of network perimeter security. Due to human error and the involvement of multiple administrators in configuring firewall rules, there exist common anomalies in firewall rulesets such as Shadowing, Generalization, Correlation, and Redundancy. There is a need for research on efficient ways of resolving such anomalies. The challenge is also to see that the reordered or resolved ruleset conforms to the organization’s framed security policy. This study proposes an ant colony optimization (ACO)-based anomaly resolution and reordering of firewall rules called ACO-based firewall anomaly mitigation engine. Modified strategies are also introduced to automatically detect these anomalies and to minimize manual intervention of the administrator. Furthermore, an adaptive reordering strategy is proposed to aid faster reordering when a new rule is appended. The proposed approach was tested with different firewall policy sets. The results were found to be promising in terms of the number of conflicts resolved, with minimal availability loss and marginal security risk. This work demonstrated the application of a metaheuristic search technique, ACO, in improving the performance of a packet-filter firewall with respect to mitigating anomalies in the rules, and at the same time demonstrated conformance to the security policy. |
format | Online Article Text |
id | pubmed-4938840 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | Springer International Publishing |
record_format | MEDLINE/PubMed |
spelling | pubmed-49388402016-07-20 Ant colony optimization-based firewall anomaly mitigation engine Penmatsa, Ravi Kiran Varma Vatsavayi, Valli Kumari Samayamantula, Srinivas Kumar Springerplus Research A firewall is the most essential component of network perimeter security. Due to human error and the involvement of multiple administrators in configuring firewall rules, there exist common anomalies in firewall rulesets such as Shadowing, Generalization, Correlation, and Redundancy. There is a need for research on efficient ways of resolving such anomalies. The challenge is also to see that the reordered or resolved ruleset conforms to the organization’s framed security policy. This study proposes an ant colony optimization (ACO)-based anomaly resolution and reordering of firewall rules called ACO-based firewall anomaly mitigation engine. Modified strategies are also introduced to automatically detect these anomalies and to minimize manual intervention of the administrator. Furthermore, an adaptive reordering strategy is proposed to aid faster reordering when a new rule is appended. The proposed approach was tested with different firewall policy sets. The results were found to be promising in terms of the number of conflicts resolved, with minimal availability loss and marginal security risk. This work demonstrated the application of a metaheuristic search technique, ACO, in improving the performance of a packet-filter firewall with respect to mitigating anomalies in the rules, and at the same time demonstrated conformance to the security policy. Springer International Publishing 2016-07-08 /pmc/articles/PMC4938840/ /pubmed/27441151 http://dx.doi.org/10.1186/s40064-016-2489-6 Text en © The Author(s) 2016 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. |
spellingShingle | Research Penmatsa, Ravi Kiran Varma Vatsavayi, Valli Kumari Samayamantula, Srinivas Kumar Ant colony optimization-based firewall anomaly mitigation engine |
title | Ant colony optimization-based firewall anomaly mitigation engine |
title_full | Ant colony optimization-based firewall anomaly mitigation engine |
title_fullStr | Ant colony optimization-based firewall anomaly mitigation engine |
title_full_unstemmed | Ant colony optimization-based firewall anomaly mitigation engine |
title_short | Ant colony optimization-based firewall anomaly mitigation engine |
title_sort | ant colony optimization-based firewall anomaly mitigation engine |
topic | Research |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4938840/ https://www.ncbi.nlm.nih.gov/pubmed/27441151 http://dx.doi.org/10.1186/s40064-016-2489-6 |
work_keys_str_mv | AT penmatsaravikiranvarma antcolonyoptimizationbasedfirewallanomalymitigationengine AT vatsavayivallikumari antcolonyoptimizationbasedfirewallanomalymitigationengine AT samayamantulasrinivaskumar antcolonyoptimizationbasedfirewallanomalymitigationengine |