Synthetic security policy generation via network traffic clustering

Taghrid Samak*, Ehab Al-Shaer

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

Security policies are an essential part in the operations of any networking system. Test policies are always needed for conducting research and development. Such policies are required in various phases of research related to many problems as performance optimization, device testing, and configuration analysis. In this paper, we introduce a novel technique that utilizes trace repositories to generate traffic-driven firewall policies. An online clustering mechanism is designed and developed to infer rule criteria and policy structure from the traffic. The approach generates policies relevant to the environment while satisfying structural features specified by testing requirements. Clustering parameters are tuned to fit the need of the testing domain. High level structural features (policy size, distinct rules, rule specificity, etc) are mapped to algorithm input parameters. The technique evaluation shows the flexibility as well as the accuracy of the generated policies compared to actual administrator-defined policies.

Original languageEnglish
Title of host publicationProceedings of the 3rd ACM Workshop on Artificial Intelligence and Security, AISec '10, Co-located with CCS'10
Pages45-53
Number of pages9
DOIs
StatePublished - 2010
Externally publishedYes
Event3rd ACM Workshop on Artificial Intelligence and Security, AISec '10, Co-located with CCS'10 - Chicago, IL, United States
Duration: 4 Jan 20108 Oct 2010

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference3rd ACM Workshop on Artificial Intelligence and Security, AISec '10, Co-located with CCS'10
Country/TerritoryUnited States
CityChicago, IL
Period4/01/108/10/10

Keywords

  • Firewall
  • Policy generation
  • Synthetic policy
  • Test cases

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Synthetic security policy generation via network traffic clustering'. Together they form a unique fingerprint.

Cite this