Learning to Customize Network Security Rules

12/28/2017
by   Michael Bargury, et al.
0

Security is a major concern for organizations who wish to leverage cloud computing. In order to reduce security vulnerabilities, public cloud providers offer firewall functionalities. When properly configured, a firewall protects cloud networks from cyber-attacks. However, proper firewall configuration requires intimate knowledge of the protected system, high expertise and on-going maintenance. As a result, many organizations do not use firewalls effectively, leaving their cloud resources vulnerable. In this paper, we present a novel supervised learning method, and prototype, which compute recommendations for firewall rules. Recommendations are based on sampled network traffic meta-data (NetFlow) collected from a public cloud provider. Labels are extracted from firewall configurations deemed to be authored by experts. NetFlow is collected from network routers, avoiding expensive collection from cloud VMs, as well as relieving privacy concerns. The proposed method captures network routines and dependencies between resources and firewall configuration. The method predicts IPs to be allowed by the firewall. A grouping algorithm is subsequently used to generate a manageable number of IP ranges. Each range is a parameter for a firewall rule. We present results of experiments on real data, showing ROC AUC of 0.92, compared to 0.58 for an unsupervised baseline. The results prove the hypothesis that firewall rules can be automatically generated based on router data, and that an automated method can be effective in blocking a high percentage of malicious traffic.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/14/2018

Data Security and Privacy Protection Data Security and Privacy Protection in Public Cloud

This paper discusses about the challenges, advantages and shortcomings o...
research
03/11/2019

CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing

Cloud computing has been adopted widely, providing on-demand computing r...
research
08/30/2019

Pacer: Network Side-Channel Mitigation in the Cloud

An important concern for many Cloud customers is data confidentiality. O...
research
03/10/2023

The Critical Node Game

Cloud networks are the backbone of the modern distributed internet infra...
research
06/16/2020

An Agent-based Cloud Service Negotiation in Hybrid Cloud Computing

With the advent of evolution of cloud computing, large organizations hav...
research
12/16/2019

Misconfiguration Management of Network Security Components

Many companies and organizations use firewalls to control the access to ...
research
11/06/2021

An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy

Since honeypots first appeared as an advanced network security concept t...

Please sign up or login with your details

Forgot password? Click here to reset