Chrome Extension
WeChat Mini Program
Use on ChatGLM

Anomaly Detection of Policies in Distributed Firewalls Using Data Log Analysis.

˜The œJournal of supercomputing/Journal of supercomputing(2023)

Cited 0|Views19
No score
Abstract
A distributed firewall is a security application that monitors and controls traffic on an organization’s network. While centralized firewalls are used against attacks coming from outside a network, distributed firewalls are considered for inside attacks from internal networks such as wireless access and VPN tunnel. Distributed firewalls use policies, which are stated by rules, to find anomalous packets. However, such static rules may be incomplete. In this case, by monitoring firewall logs, the anomalies can be detected. Such logs become big when networks have high traffic, but their hidden knowledge contains valuable information about existing anomalies. In this paper, to detect the anomalies, we extract patterns from big data logs of distributed firewalls using data mining and machine learning. The proposed method is applied to big logs from distributed firewalls in a real security environment, and results are analyzed.
More
Translated text
Key words
Anomalous packet,Policy rule,Firewall big data log,Machin learning
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined