CFP last date
20 January 2025
Reseach Article

Firewall Rule Anomaly Detection and Resolution using Particle Swarm Optimization Algorithm

by John Kingsley Arthur, Edward Kwadwo Boahen, Ronky Francis Doh, Eric Appiah Mantey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 33
Year of Publication: 2019
Authors: John Kingsley Arthur, Edward Kwadwo Boahen, Ronky Francis Doh, Eric Appiah Mantey
10.5120/ijca2019919215

John Kingsley Arthur, Edward Kwadwo Boahen, Ronky Francis Doh, Eric Appiah Mantey . Firewall Rule Anomaly Detection and Resolution using Particle Swarm Optimization Algorithm. International Journal of Computer Applications. 178, 33 ( Jul 2019), 32-37. DOI=10.5120/ijca2019919215

@article{ 10.5120/ijca2019919215,
author = { John Kingsley Arthur, Edward Kwadwo Boahen, Ronky Francis Doh, Eric Appiah Mantey },
title = { Firewall Rule Anomaly Detection and Resolution using Particle Swarm Optimization Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2019 },
volume = { 178 },
number = { 33 },
month = { Jul },
year = { 2019 },
issn = { 0975-8887 },
pages = { 32-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number33/30754-2019919215/ },
doi = { 10.5120/ijca2019919215 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:52:09.306014+05:30
%A John Kingsley Arthur
%A Edward Kwadwo Boahen
%A Ronky Francis Doh
%A Eric Appiah Mantey
%T Firewall Rule Anomaly Detection and Resolution using Particle Swarm Optimization Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 33
%P 32-37
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The firewall ensures the protection of a network by falling on some number of defined rules set by the administrator of the computer network. Managing these rules to be optimum without errors is very difficult and sometimes leads to the formation of anomalies such as redundant, correlation, and shadowing rules. This defined problem has received the attention of both the academic and industry players in finding a pragmatic solution. A lot of reasonable attempts has been made by researchers of which many resorted to the automation of the firewall rule management process. The automation is to aid determine and resolve the conflicting rules and also to reduce the load that will be on the network administrator, which almost always leads to the creation of contradictory rules. The existing literature has not focused much on the amount of time it takes to determine and resolve these anomalies. Most of the conflicting rules are as a result of the wrongful position[index] a rule may occupy in the rule list. The research proposes a contextual design of an improved firewall framework, that rest on the heuristic approach of the Particle Swarm Optimization (PSO) Algorithm to determine and assign the best position [index] to a rule and thereby improving the search and resolution of identified anomalies in a firewall rules list. Three (3) lightweight algorithms are designed for anomaly detection and resolution using PSO as the backbone.

References
  1. Darade, R. V. and Kumbharkar, P.B. “Firewall policy anomaly detection and resolution”, An International Journal of Advanced Computer technology, (June, 2014). Volume III, Issue VI in COPUSOFT
  2. Khummanee, S., Khumseela, A., Puangpronpitag, S. 2013. Towards a New Design of Firewall: Anomaly Elimination and Fast Verifying of Firewall Rules, in 10th International Joint Conference on Computer Science and Software Engineering (JCSSE).
  3. Abedin, M., Nessa, S., Khan, L., and Thuraisingham, B., “Detection and Resolution of Anomalies in Firewall Policy Rules”, in Damiani E., Liu. P(eds) Data and Applications Security XX. DBSec 2006. Lecture Notes in Computer Science, vol 4127. Springer, Berlin, Heidelberg.
  4. Farouk, A., Agiza, H. N., and Radwan, E. “Detecting inconsistent firewall configuration rules using range algorithm” in International Conference on Machine Learning and Computing IPCSIT vol.3, IACSIT Press, Singapore.
  5. Swamy, D. K., Narender, T. “Improvements in Firewall Policy Rules to Identifying and Resolving Anomalies” in International Journal Of Advanced Research and Innovations, Vol.1, Issue .9
  6. Chandre, P. R., Surve, R.R., Badhan, S. R., Surve, A. B., Mane, V. T. “Anomalies of Firewall Policy Detection and Resolution” in International Journal of Engineering Research and Applications, ISSN: 2248-9622, Vol. 4, Issue 3(Version 1), March 2014, pp. 696-701
  7. Kachare, S. S., Deshmukh, P.K. “Firewall Policy Anomaly Management with Optimizing Rule Order”, in International Journal of Application or Innovation in Engineering & Management (IJAIEM), ISSN 2319 – 4847, Volume 4, Issue 2, February 2015.
  8. Jitha, C. K., Namboodiri, S. “Firewall Policy Anomalies- Detection and Resolution”, in International Journal of Computer Trends and Technology (IJCTT), Volume 4, Issue 7, July 2013
  9. D. Hemkumar, M. Chugh, “Methods for Firewall Policy Detection and Prevention”, in International Journal of Science, Engineering and Technology Research(IJSETR), Volume 3, Issue 7, July 2014.
  10. Sethuram, J., and Sankareeswari, G. “Redundancy Management a nd Anomaly Detection o n Firewall Ruleset u sing Fame”, in International Journal of Science Technology & Engineering, Volume 1, Issue 10, April 2015. ISSN(online): 2349-784X.
  11. Prasath, A. Y., and Revithi, N.,“Dynamic Rule based Interfirewall Optimization using Redundancy Removal Algorithm”, in International Journal of Computer Applications. Volume 92, No. 6, April 2014
  12. Hongxin, H.,
 A. Gail-Joon, A., and K. Kulkarni, “Detecting and Resolving Firewall Policy Anomalies”, in IEEE Transactions On Dependable And Secure Computing, Vol. 9, NO. 3, MAY/JUNE 2012
  13. Anbarasan, A., Balasubramani, G., Madhan, C., Naveenkumar, P., and N.S. Nithya, “Detecting and Resolving Firewall Policy Anomalies Using Rule-Based Segmentation”, in International Journal of Computer Science and Mobile Computing(IJCSMC), Vol. 2, Issue. 4, April 2013, pg.134 – 137.
  14. El-Alfy, E. M. “A Heuristic Approach for firewall Policy Optimization”, in ICACT 2007.
  15. Al-Maolegi, M. and Arkok, B. “An Improved Apriori Algorithm For Association Rules”, in International Journal on Natural Language Computing (IJNLC). Vol. 3, No.1, February 2014.
  16. Engelbrecht, A. P. “Computational Intelligence: An Introduction”, in John Wiley & Sons Ltd. 2nd Edition. 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Firewall rule management Network Security Particle Swarm Optimization Algorithm