Internet firewalls are a composite of both hardware and software components, which are employed to enforce a security policy dictating the movement of data between many networks. Conventional firewalls depend on pre-established rules and signatures in order to identify and prevent the transmission of harmful network traffic. Nevertheless, it is worth noting that the aforementioned regulations and authentication methods frequently remain unchanging and can be effortlessly circumvented by highly skilled assailants. This analysis improves the use of firewall in detecting internet attacks using machine learning techniques. This study introduces a novel approach to enhance internet firewall efficacy through the integration of machine learning techniques. By leveraging a sophisticated model, the proposed system achieves exceptional performance, attaining a remarkable 99.99% precision, recall, and F1-score. This significant advancement in accuracy demonstrates the potential of employing machine learning in fortifying internet security infrastructure. The model's ability to consistently and reliably discern malicious activities from benign traffic showcases its robustness in real-world scenarios, thus presenting a promising avenue for bolstering network defense mechanisms. This research not only contributes to the burgeoning field of cybersecurity but also lays the foundation for future innovations in adaptive and intelligent firewall systems.
Published in | American Journal of Computer Science and Technology (Volume 6, Issue 4) |
DOI | 10.11648/j.ajcst.20230604.14 |
Page(s) | 170-179 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2023. Published by Science Publishing Group |
Firewall, Machine Learning, Cyber-Attacks, Response Policy
[1] | Ahmed, M., Masud, M., & Mamun, A. (2020). Comparisons among multiple machine learning based classifiers for breast cancer risk stratification using electrical impedance spectroscopy. European Journal of Electrical Engineering and Computer Science, 4(4). https://doi.org/10.24018/ejece.2020.4.4.227 |
[2] | Sun, J., Zhong, G., Huang, K., & Dong, J. (2018). Banzhaf random forests: cooperative game theory based random forests with consistency. Neural Networks, 106, 20-29. https://doi.org/10.1016/j.neunet.2018.06.006 |
[3] | Zhang, W., Chen, X., Liu, Y., & Xi, Q. (2020). A distributed storage and computation k-nearest neighbor algorithm based cloud-edge computing for cyber-physical-social systems. Ieee Access, 8, 50118-50130. https://doi.org/10.1109/access.2020.2974764. |
[4] | Al-Haija, Q. and Ishtaiwi, A. (2021). Machine learning based model to identify firewall decisions to improve cyber-defense. International Journal on Advanced Science Engineering and Information Technology, 11(4), 1688. https://doi.org/10.18517/ijaseit.11.4.14608 |
[5] | Jordan, M. and Mitchell, T. (2015). Machine learning: trends, perspectives, and prospects. Science, 349(6245), 255-260. https://doi.org/10.1126/science.aaa8415 |
[6] | Khonde, S. and Ulagamuthalvi, V. (2020). Hybrid architecture for distributed intrusion detection system using semi-supervised classifiers in ensemble approach. Advances in Modelling and Analysis B, 63(1-4), 10-19. https://doi.org/10.18280/ama_b.631-403 |
[7] | Dawadi, Babu R., Bibek Adhikari, and Devesh Kumar Srivastava. "Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks." Sensors 23, no. 4 (2023): 2073. |
[8] | Applebaum, Simon, Tarek Gaber, and Ali Ahmed. "Signature-based and machine-learning-based web application firewalls: A short survey." Procedia Computer Science 189 (2021): 359-367. |
[9] | Prabakaran, Senthil, Ramalakshmi Ramar, Irshad Hussain, Balasubramanian Prabhu Kavin, Sultan S. Alshamrani, Ahmed Saeed AlGhamdi, and Abdullah Alshehri. "Predicting attack pattern via machine learning by exploiting stateful firewall as virtual network function in an SDN network." Sensors 22, no. 3 (2022): 709. |
[10] | Appelt, D., Nguyen, C. D., Panichella, A., & Briand, L. C. (2018). A machine-learning-driven evolutionary approach for testing web application firewalls. IEEE Transactions on Reliability, 67(3), 733-757. |
[11] | Shaheed, Aref, and M. H. D. Kurdy. "Web Application Firewall Using Machine Learning and Features Engineering." Security and Communication Networks 2022 (2022). |
[12] | Ito, Michiaki, and Hitoshi Iyatomi. "Web application firewall using character-level convolutional neural network." In 2018 IEEE 14th International Colloquium on Signal Processing & Its Applications (CSPA), pp. 103-106. IEEE, 2018. |
[13] | Taylor, O. E., and P. S. Ezekiel. "A Robust System for Detecting and Preventing Payloads Attacks on Web-Applications Using Recurrent Neural Network (RNN)." European Journal of Computer Science and Information Technology 10, no. 4 (2022): 1-13. |
[14] | Rajesh, Shriram, Marvin Clement, Sooraj SB, Al Shifan SH, and Jyothi Johnson. "Real-Time DDoS Attack Detection Based on Machine Learning Algorithms." Proceedings of the Yukthi (2021). |
[15] | Lente, Caio, Roberto Hirata Jr, and Daniel Macêdo Batista. "An Improved Tool for Detection of XSS Attacks by Combining CNN with LSTM." In Anais Estendidos do XXI Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, pp. 1-8. SBC, 2021. |
[16] | Karacan, Hacer, and Mehmet Sevri. "A novel data augmentation technique and deep learning model for web application security." IEEE Access 9 (2021): 150781-150797. |
[17] | Uçar, E. and Ozhan, E. (2017). The analysis of firewall policy through machine learning and data mining. Wireless Personal Communications, 96(2), 2891-2909. https://doi.org/10.1007/s11277-017-4330-0 |
[18] | Breiman, L. (1996). Bagging predictors. Machine Learning, 24(2), 123-140. https://doi.org/10.1007/bf00058655 |
[19] | Cao, H., Sarlin, R., & Jung, A. (2020). Learning explainable decision rules via maximum satisfiability. Ieee Access, 8, 218180-218185. https://doi.org/10.1109/access.2020.3041040 |
[20] | Cutler, D., Edwards, T., Beard, K., Cutler, A., Hess, K., Gibson, J., … & Lawler, J. (2007). Random forests for classification in ecology. Ecology, 88(11), 2783-2792. https://doi.org/10.1890/07-0539.1 |
[21] | Kulkarni, V. and Sinha, P. (2012). Pruning of random forest classifiers: a survey and future directions. https://doi.org/10.1109/icdse.2012.6282329 |
[22] | Quinlan, J. (1986). Induction of decision trees. Machine Learning, 1(1), 81-106. https://doi.org/10.1007/bf00116251 |
[23] | Samworth, R. (2012). Optimal weighted nearest neighbour classifiers. The Annals of Statistics, 40(5). https://doi.org/10.1214/12-aos1049 |
APA Style
Ozohu Musa, M., Victor-Ime, T. (2023). Improving Internet Firewall Using Machine Learning Techniques. American Journal of Computer Science and Technology, 6(4), 170-179. https://doi.org/10.11648/j.ajcst.20230604.14
ACS Style
Ozohu Musa, M.; Victor-Ime, T. Improving Internet Firewall Using Machine Learning Techniques. Am. J. Comput. Sci. Technol. 2023, 6(4), 170-179. doi: 10.11648/j.ajcst.20230604.14
AMA Style
Ozohu Musa M, Victor-Ime T. Improving Internet Firewall Using Machine Learning Techniques. Am J Comput Sci Technol. 2023;6(4):170-179. doi: 10.11648/j.ajcst.20230604.14
@article{10.11648/j.ajcst.20230604.14, author = {Martha Ozohu Musa and Temitope Victor-Ime}, title = {Improving Internet Firewall Using Machine Learning Techniques}, journal = {American Journal of Computer Science and Technology}, volume = {6}, number = {4}, pages = {170-179}, doi = {10.11648/j.ajcst.20230604.14}, url = {https://doi.org/10.11648/j.ajcst.20230604.14}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajcst.20230604.14}, abstract = {Internet firewalls are a composite of both hardware and software components, which are employed to enforce a security policy dictating the movement of data between many networks. Conventional firewalls depend on pre-established rules and signatures in order to identify and prevent the transmission of harmful network traffic. Nevertheless, it is worth noting that the aforementioned regulations and authentication methods frequently remain unchanging and can be effortlessly circumvented by highly skilled assailants. This analysis improves the use of firewall in detecting internet attacks using machine learning techniques. This study introduces a novel approach to enhance internet firewall efficacy through the integration of machine learning techniques. By leveraging a sophisticated model, the proposed system achieves exceptional performance, attaining a remarkable 99.99% precision, recall, and F1-score. This significant advancement in accuracy demonstrates the potential of employing machine learning in fortifying internet security infrastructure. The model's ability to consistently and reliably discern malicious activities from benign traffic showcases its robustness in real-world scenarios, thus presenting a promising avenue for bolstering network defense mechanisms. This research not only contributes to the burgeoning field of cybersecurity but also lays the foundation for future innovations in adaptive and intelligent firewall systems. }, year = {2023} }
TY - JOUR T1 - Improving Internet Firewall Using Machine Learning Techniques AU - Martha Ozohu Musa AU - Temitope Victor-Ime Y1 - 2023/11/29 PY - 2023 N1 - https://doi.org/10.11648/j.ajcst.20230604.14 DO - 10.11648/j.ajcst.20230604.14 T2 - American Journal of Computer Science and Technology JF - American Journal of Computer Science and Technology JO - American Journal of Computer Science and Technology SP - 170 EP - 179 PB - Science Publishing Group SN - 2640-012X UR - https://doi.org/10.11648/j.ajcst.20230604.14 AB - Internet firewalls are a composite of both hardware and software components, which are employed to enforce a security policy dictating the movement of data between many networks. Conventional firewalls depend on pre-established rules and signatures in order to identify and prevent the transmission of harmful network traffic. Nevertheless, it is worth noting that the aforementioned regulations and authentication methods frequently remain unchanging and can be effortlessly circumvented by highly skilled assailants. This analysis improves the use of firewall in detecting internet attacks using machine learning techniques. This study introduces a novel approach to enhance internet firewall efficacy through the integration of machine learning techniques. By leveraging a sophisticated model, the proposed system achieves exceptional performance, attaining a remarkable 99.99% precision, recall, and F1-score. This significant advancement in accuracy demonstrates the potential of employing machine learning in fortifying internet security infrastructure. The model's ability to consistently and reliably discern malicious activities from benign traffic showcases its robustness in real-world scenarios, thus presenting a promising avenue for bolstering network defense mechanisms. This research not only contributes to the burgeoning field of cybersecurity but also lays the foundation for future innovations in adaptive and intelligent firewall systems. VL - 6 IS - 4 ER -