TY - GEN
T1 - Synthetic security policy generation via network traffic clustering
AU - Samak, Taghrid
AU - Al-Shaer, Ehab
PY - 2010
Y1 - 2010
N2 - Security policies are an essential part in the operations of any networking system. Test policies are always needed for conducting research and development. Such policies are required in various phases of research related to many problems as performance optimization, device testing, and configuration analysis. In this paper, we introduce a novel technique that utilizes trace repositories to generate traffic-driven firewall policies. An online clustering mechanism is designed and developed to infer rule criteria and policy structure from the traffic. The approach generates policies relevant to the environment while satisfying structural features specified by testing requirements. Clustering parameters are tuned to fit the need of the testing domain. High level structural features (policy size, distinct rules, rule specificity, etc) are mapped to algorithm input parameters. The technique evaluation shows the flexibility as well as the accuracy of the generated policies compared to actual administrator-defined policies.
AB - Security policies are an essential part in the operations of any networking system. Test policies are always needed for conducting research and development. Such policies are required in various phases of research related to many problems as performance optimization, device testing, and configuration analysis. In this paper, we introduce a novel technique that utilizes trace repositories to generate traffic-driven firewall policies. An online clustering mechanism is designed and developed to infer rule criteria and policy structure from the traffic. The approach generates policies relevant to the environment while satisfying structural features specified by testing requirements. Clustering parameters are tuned to fit the need of the testing domain. High level structural features (policy size, distinct rules, rule specificity, etc) are mapped to algorithm input parameters. The technique evaluation shows the flexibility as well as the accuracy of the generated policies compared to actual administrator-defined policies.
KW - Firewall
KW - Policy generation
KW - Synthetic policy
KW - Test cases
UR - http://www.scopus.com/inward/record.url?scp=78650151051&partnerID=8YFLogxK
U2 - 10.1145/1866423.1866433
DO - 10.1145/1866423.1866433
M3 - Conference contribution
AN - SCOPUS:78650151051
SN - 9781450300889
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 45
EP - 53
BT - Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security, AISec '10, Co-located with CCS'10
T2 - 3rd ACM Workshop on Artificial Intelligence and Security, AISec '10, Co-located with CCS'10
Y2 - 4 January 2010 through 8 October 2010
ER -