Open Access   Article Go Back

Classification of Firewall Logs Using Supervised Machine Learning Algorithms

Hajar Esmaeil As-Suhbani1 , S.D. Khamitkar2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-8 , Page no. 301-304, Aug-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i8.301304

Online published on Aug 31, 2019

Copyright © Hajar Esmaeil As-Suhbani, S.D. Khamitkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Hajar Esmaeil As-Suhbani, S.D. Khamitkar, “Classification of Firewall Logs Using Supervised Machine Learning Algorithms,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.301-304, 2019.

MLA Style Citation: Hajar Esmaeil As-Suhbani, S.D. Khamitkar "Classification of Firewall Logs Using Supervised Machine Learning Algorithms." International Journal of Computer Sciences and Engineering 7.8 (2019): 301-304.

APA Style Citation: Hajar Esmaeil As-Suhbani, S.D. Khamitkar, (2019). Classification of Firewall Logs Using Supervised Machine Learning Algorithms. International Journal of Computer Sciences and Engineering, 7(8), 301-304.

BibTex Style Citation:
@article{As-Suhbani_2019,
author = {Hajar Esmaeil As-Suhbani, S.D. Khamitkar},
title = {Classification of Firewall Logs Using Supervised Machine Learning Algorithms},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2019},
volume = {7},
Issue = {8},
month = {8},
year = {2019},
issn = {2347-2693},
pages = {301-304},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4827},
doi = {https://doi.org/10.26438/ijcse/v7i8.301304}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i8.301304}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4827
TI - Classification of Firewall Logs Using Supervised Machine Learning Algorithms
T2 - International Journal of Computer Sciences and Engineering
AU - Hajar Esmaeil As-Suhbani, S.D. Khamitkar
PY - 2019
DA - 2019/08/31
PB - IJCSE, Indore, INDIA
SP - 301-304
IS - 8
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
661 519 downloads 180 downloads
  
  
           

Abstract

Most operating systems services and network devices, such as Firewalls, generate huge amounts of network data in the form of logs and alarms. Theses log files can be used for network supervision and debugging. One important function of log files is logging security related or debug information, for example logging error logging and unsuccessful authentication. In this study, 500,000 instances, which have been generated from Snort and TWIDS, have been examined using 6 features. The Action attribute was selected as the class attribute. The “Allow” and “Drop” parameters have been specified for Action class. The firewall logs dataset is analyzed and the features are inserted to machine learning classifiers including Naive Bayes, kNN, One R and J48 using Spark in Weka tool. In addition, we compared the classification performance of these algorithms in terms of measurement metrics including Accuracy, F-measure and ROC values.

Key-Words / Index Term

Machine Learning Algorithms, Classification, log analysis, firewall, Spark

References

[1] Rizzardi, A.Security in Internet of Things: networked smart objects. (Doctoral Thesis, Università degli Studi dell`Insubria, 2016).
[2] Roesch, M. (1999, November). Snort: Lightweight intrusion detection for networks. In Lisa (Vol. 99, No. 1, pp. 229-238).
[3] F. Ertam and M. Kaya, "Classification of firewall log files with multiclass support vector machine," 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, 2018, pp.1-4. doi: 10.1109/ISDFS.2018.8355382.
[4] R. Hunt, “Internet/Intranet firewall security - Policy, architecture and transaction services,” Comput. Commun., vol. 21, no. 13, pp. 1107–1123, 1998.
[5] Golnabi, K., Min, R. K., Khan, L., & Al-Shaer, E. (2006). Analysis of firewall policy rules using data mining techniques. In 10th IEEE/IFIP Network Operations and Management Symposium NOMS 2006 (Vol. 5, pp. 305–315). IEEE. doi:10.1109/NOMS.2006.1687561.
[6] Breier, J., & Branišová, J. (2017). A dynamic rule creation based anomaly detection method for identifying security breaches in log records. Wireless Personal Communications, 94(3), 497-511.
[7] Ucar, E., Ozhan, E.: The analysis of firewall policy through machine learning and data mining. Wirel. Pers. Commun. 96, 2891 (2017). https://doi.org/10.1007/s11277-017-4330-0.

[8] Al-Shaer, E. S., & Hamed, H. H. (2003, March). Firewall policy advisor for anomaly discovery and rule editing. In International Symposium on Integrated Network Management (pp. 17-30). Springer, Boston, MA.
[9] Al-Shaer, E., Hamed, H., Boutaba, R., & Hasan, M. (2005). Conflict classification and analysis of distributed firewall policies. IEEE journal on selected areas in communications, 23(10), 2069-2084.
[10] Snort. An open source network intrusion detection system. http://www.Snort.org/.
[11] Link to download TWIDS tool: http://twids.cute.edu.tw/en.
[12] As-Suhbani, H., Khamitkar, S.D. (2017): Enhancing snort IDS performance using TWIDS for collecting network logs dataset. Int. J. Res. Adv. Eng. Technol. 42–45 (2017). https://doi.org/10.22271/engineering.
[13] Link to download Weka:
http://www.cs.waikato.ac.nz/ml/weka/
[14] Z. C. Lipton, C. Elkan, and B. Naryanaswamy, “Optimal thresholding of classifiers to maximize F1 measure,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, vol. 8725 LNAI, no. PART 2, pp. 225–239.