Machine Learning Based Model to Identify Firewall Decisions to Improve Cyber-Defense
How to cite (IJASEIT) :
W. Noonan, I. Dubrawsky, “Firewall fundamentals”, Pearson Education, 2006.
Q. A. Al-Haija, S. Zein-Sabatto, "An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks" Electronics, MDPI, vol. 9, no. 12: paper no. 2152., 2020.
E. Ucar, E. Ozhan, “The Analysis of Firewall Policy Through Machine Learning and Data Mining”, Wireless Personal Communication, Springer, vol. 96, p.p. 2891-2909, 2017.
G. Caspi, “Introducing Deep Learning: Boosting Cybersecurity with an Artificial Brain. Informa Tech” Dark Reading, Analytics http://www.darkreading.com/analytics, 2016.
Q.A. Al-Haija, C.D. McCurry, S. Zein-Sabatto, “Intelligent Self-reliant Cyber-Attacks Detection and Classification System for IoT Communication Using Deep Convolutional Neural Network”, Selected Papers from 12th International Networking Conference. INC 2020. Lecture Notes in Networks and Systems, vol.180. Springer, 2021.
J. Brownlee, “4 Types of Classification Tasks in Machine Learning”, Python Machine Learning, Machine Learning Mastery, 2020.
S. Haykin, “Neural Networks and Learning Machines. 3rd Edition, Pearson publications, ISBN-13: 978-0-13-147139-9, 2009.
C. C. Aggarwal, “Machine Learning with Shallow Neural Networks”, Neural Networks and Deep Learning. Springer, 2019.
Fei-Fei. CS231n: Convolutional Neural Networks for Visual Recognition. Computer Science, Stanford University. Available online: http://cs231n.stanford.edu, 2019.
J. S. Meneses, Z.R. Chavez, J.G. Rodriguez, "Compressed kNN: K-Nearest Neighbors with Data Compression" Entropy, MDPI, vol. 21, no. 3, paper no. 234, 2019.
Y.Y. Song, Y. Lu, “Decision tree methods: applications for classification and prediction. Shanghai Arch Psychiatry”, PMID: 26120265; PMCID: PMC4466856, vol. 27, no.2, p.p.130-5, 2015.
B. A. Tama, K. H. Rhee, “An extensive empirical evaluation of classifier ensembles for intrusion detection task”, International Journal Computer Systems Science and Engineering, CRL Publishing Ltd, vol. 32, no.2, p.p.149-158, 2017.
A. Ghose, “Support Vector Machine (SVM) Tutorial: Learning SVMs from examples”. Medium: towards data science, 2017.
R. Garg, “Types of Classification Algorithms”, Analytics India Magazine, 2018.
F. Ertam, M. Kaya, "Classification of firewall log files with multi-class support vector machine," in Proc. Of 6thInternational Symposium on Digital Forensic and Security (ISDFS), Antalya, pp. 1-4, 2019.
Q. A. Al-Haija, L. Tawalbeh, "Autoregressive Modeling and Prediction of Annual Worldwide Cybercrimes for Cloud Environments," in Proc. Of 10th International Conference on Information and Communication Systems (ICICS), 2019, pp. 47-51.
D. Appelt, C. D. Nguyen, A. Panichella, L. C. Briand, "A Machine-Learning-Driven Evolutionary Approach for Testing Web Application Firewalls," IEEE Transactions on Reliability, vol. 67, no. 3, pp. 733-757, 2018, doi: 10.1109/TR.2018.2805763.
E. Ucar, E. Ozhan, “The Analysis of Firewall Policy Through Machine Learning and Data Mining”, Wireless Personal Communication, Springer, vol. 96, p.p. 2891-2909, 2017.
A. M. Vartouni, M. Teshnehlab, S. S. Kashi, “Leveraging deep neural networks for anomaly-based web application firewall”, IET Information Security, vol. 13, p.p. 352-361, 2019.
F. Ertam, “An efficient hybrid deep learning approach for internet security”, Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 535, 2019
J.J. Praise, R.J Raj, J.V. Benifa, “Development of Reinforcement Learning and Pattern Matching (RLPM) Based Firewall for Secured Cloud Infrastructure”, Wireless Personal Communication, Springer, vol.115, p.p. 993-1018, 2020.
G. Bendiab, S. Shiaeles, A. Alruban, N. Kolokotronis, “IoT Malware Network Traffic Classification using Visual Representation and Deep Learning”, in Proc. Of 6th IEEE Conference on Network Softwarization (NetSoft), Ghent, Belgium, 29 June-3 July 2020; pp. 444-449.
R. Shire, S. Shiaeles, K. Bendiab, B. Ghita, N. Kolokotronis, “Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualization”, in Proc. Of Internet of Things, Smart Spaces, and Next Generation Networks and Systems. Lecture Notes in Computer Science; Springer, vol.11660, 2019
I. Baptista, S. Shiaeles, N. Kolokotronis, “A Novel Malware Detection System Based On Machine Learning and Binary Visualization”, in Proc. Of IEEE International Conference on Communications (IEEE ICC), China, pp. 1-6, 2019.
K.A. Taher, B.M. Jisan, M.M Rahman, “Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection”, in Proc. Of International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), South Asia, 10-12 January 2019; pp. 643-646.
X. Gao, C. Shan, C. Hu, Z. Niu, Z. Liu, “An Adaptive Ensemble Machine Learning Model for Intrusion Detection”, IEEE Access, vol. 7, p.p. 82512-82521, 2019.
Q. A. Al-Haija, M. Alkhatib, A. B. Jaafar, “Choices on Designing Gf (P) Elliptic Curve Coprocessor Benefiting from Mapping Homogeneous Curves in Parallel Multiplications”, International Journal on Computer Science and Engineering (IJCSE), ISSN: 0975-3397, vol. 3 no. 2, 2011.
S. Sapre, P. Ahmadi, K. Islam, “A Robust Comparison of the KDDCup99 and NSL-KDD IoT Network Intrusion Detection Datasets through Various Machine Learning Algorithms”, arXiv:1912.13204v1, 2019.
M.M. Chowdhury, F. Hammond, G. Konowicz, C. Xin, H. Wu, J. Li, “A few-shot deep learning approach for improved intrusion detection”, 2017 in Proc. Of IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), NY, USA, 19-21 October 2017; pp. 456-462.
A. Javaid, Q. Niyaz, W. Sun, M. Alam, “A Deep Learning Approach for Network Intrusion Detection System”, in Proc. Of 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), NY, USA, 24 May 2016; pp. 21-26.
Y. Imamverdiyev, L. Sukhostat, “Anomaly detection in network traffic using extreme learning machine”, in Proc. Of IEEE 10th International Conference on Application of Information and Communication Technologies (AICT), Azerbaijan, 12-14 October 2016; pp. 1-4.
UCI: Machine Learning Repository, “Internet Firewall Data Set”, Center for Machine Learning and Intelligent Systems, 2019.
A. Wang, “Encode Smarter: How to Easily Integrate Categorical Encoding into Your Machine Learning Pipeline”, Feature Labs. https://blog.featurelabs.com, 2019.
Q. A. Al-Haija, M. Smadi, S. Zein-Sabatto, “Multi-Class Weather Classification Using ResNet-18 CNN for Autonomous IoT and CPS Applications” in Proc. Of IEEE 7th Annual Conference on Computational Science & Computational Intelligence (CSCI'20), Las Vegas, USA, 2020.
K.E. Koech, “Cross-Entropy Loss Function”, Medium: towards data science, 2020.
A. I. Pí®rí®u, M. Leonte, N. Postolachi and D. T. Gavrilut, "Optimizing Cleanset Growth by Using Multi-Class Neural Networks," in Proc. Of 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), Romania, pp. 425-429, 2018.
A. Banjongkan, et. al., “A Comparative Study of Learning Techniques with Convolutional Neural Network Based on HPC-Workload Dataset” Inter. Journal of Machine Learning and Computing, vol. 10, no.1, 2020.
S. Allagi and R. Rachh, "Analysis of Network log data using Machine Learning," in Proc. Of IEEE 5th International Conference for Convergence in Technology, India, pp. 1-3, 2019.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).