An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets
Abstract
:1. Introduction
Contribution
2. State of the Art
Research Gap
3. Methodology
- -
- is a finite set of places;
- -
- is a finite set of transitions;
- -
- is a finite set of propositions;
- -
- is an input incidence matrix, which defines a mapping from places to transitions;
- -
- is an output incidence matrix, which defines a mapping from transitions to places;
- -
- is an association function, which maps places to real values between 0 and 1;
- -
- is a mapping between places and propositions;
- -
- is the truth values of all places, expressed by the vector , which map from places to simplified neutrosophic number (SNNs); and is an SNN. The initial marking vector is denoted by ;
- -
- is a vector expressed by ; is the certainty factor of transition ; and n is the numbers of transitions.
- -
- assigns a value to each arc between input place and transition, expressed by whose element indicates how much the place affects the following transition , with
- -
- assigns a threshold value to each transition, expressed by whose elements take the form of simplified neutrosophic number (SNN).
3.1. Level 1 Filtering
3.2. Level-2 Filtering
4. Results and Discussions
4.1. Experiment 1: (Computational Cost)
- -
- The Aim
- -
- Findings
- -
- Justification
4.2. Experiment 2: (Comparative Study)
- -
- The Aim
- -
- Findings
- -
- Justification
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Geismann, J.; Bodden, E. A systematic literature review of model-driven security engineering for cyber–physical systems. J. Syst. Softw. 2020, 169, 110697. [Google Scholar] [CrossRef]
- Mikko, H.; Nyman, L. The internet of (vulnerable) things: On Hypponen’s law, security engineering, and IoT legislation. Technol. Innov. Manag. Rev. 2017, 7, 5–11. [Google Scholar]
- Aljawarneh, S.; Alawneh, A.; Jaradat, R. Cloud security engineering: Early stages of SDLC. Future Gener. Comput. Syst. 2017, 74, 385–392. [Google Scholar] [CrossRef]
- Anderson, R. Security Engineering: A Guide to Building Dependable Distributed Systems; John Wiley & Sons: Hoboken, NJ, USA, 2020. [Google Scholar]
- Prabakaran, S.; Ramar, R.; Hussain, I.; Kavin, B.; Alshamrani, S.; AlGhamdi, A.; Alshehri, A. Predicting attack pattern via machine learning by exploiting stateful firewall as virtual network function in an SDN network. Sensors 2022, 22, 709. [Google Scholar] [CrossRef]
- Bringhenti, D.; Marchetto, G.; Sisto, R.; Valenza, F.; Yusupov, J. Automated firewall configuration in virtual networks. IEEE Trans. Dependable Secur. Comput. 2022, 20, 1559–1576. [Google Scholar] [CrossRef]
- Aljabri, M.; Alahmadi, A.; Mohammad, R.; Aboulnour, M.; Alomari, D.; Almotiri, S. Classification of firewall log data using multiclass machine learning models. Electronics 2022, 11, 1851. [Google Scholar] [CrossRef]
- Liang, J.; Kim, Y. Evolution of firewalls: Toward securer network using next generation firewall. In Proceedings of the IEEE Annual Computing and Communication Workshop and Conference, Las Vegas, NV, USA, 26–29 January 2022; pp. 0752–0759. [Google Scholar]
- Bringhenti, D.; Valenza, F. Optimizing distributed firewall reconfiguration transients. Comput. Netw. 2022, 215, 109183. [Google Scholar] [CrossRef]
- Amal, M.; Venkadesh, P. H-DOCTOR: Honeypot based firewall tuning for attack prevention. Meas. Sens. 2023, 25, 100664. [Google Scholar] [CrossRef]
- Mukkamala, P.; Rajendran, S. A survey on the different firewall technologies. Int. J. Eng. Appl. Sci. Technol. 2020, 5, 363–365. [Google Scholar] [CrossRef]
- Kim, S.; Yoon, S.; Narantuya, J.; Lim, H. Secure collecting, optimizing, and deploying of firewall rules in software-defined networks. IEEE Access 2020, 8, 15166–15177. [Google Scholar] [CrossRef]
- Chao, C.; Yang, S. A Novel Mechanism for Anomaly Removal of Firewall Filtering Rules. J. Internet Technol. 2020, 21, 949–957. [Google Scholar]
- Ullah, K.; Rashid, I.; Afzal, H.; Iqbal, M.; Bangash, Y.; Abbas, H. SS7 vulnerabilities—A survey and implementation of machine learning vs rule based filtering for detection of SS7 network attacks. IEEE Commun. Surv. Tutor. 2020, 22, 1337–1371. [Google Scholar] [CrossRef]
- Bagheri, S.; Shameli-Sendi, A. Dynamic firewall decomposition and composition in the cloud. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3526–3539. [Google Scholar] [CrossRef]
- Khairi, H.; Ariffin, S.; Latiff, N.; Yusof, K.; Hassan, M.; Rava, M. The impact of firewall on TCP and UDP throughput in an open flow software defined network. Indones. J. Electr. Eng. Comput. Sci. 2020, 20, 256–263. [Google Scholar]
- Hakani, D. A Survey on Firewall for cloud security with Anomaly detection in Firewall Policy. In Proceedings of the International Conference on Artificial Intelligence and Smart Communication, Greater Noida, India, 27–29 January 2023; pp. 825–830. [Google Scholar]
- Mambetov, S.; Begimbayeva, Y.; Joldasbayev, S.; Kazbekova, G. Internet threats and ways to protect against them: A brief review. In Proceedings of the International Conference on Cloud Computing, Data Science & Engineering, Noida, India, 19–20 January 2023; pp. 195–198. [Google Scholar]
- Apiecionek, L.; Biedziak, M. Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection. J. Univers. Comput. Sci. 2020, 26, 1435–1454. [Google Scholar] [CrossRef]
- Watkins, L.; Ballard, J.; Hamilton, K.; Chow, J.; Rubin, A.; Robinson, W.; Davis, C. Bio-Inspired, Host-based Firewall. In Proceedings of the International Conference on Computational Science and Engineering, Guangzhou, China, 29 December 2020–1 January 2021; pp. 86–91. [Google Scholar]
- Hassan, M.; Darwish, S.; Elkaffas, S. An Efficient Deadlock Handling Model Based on Neutrosophic Logic: Case Study on Real Time Healthcare Database Systems. IEEE Access 2022, 10, 76607–76621. [Google Scholar] [CrossRef]
- Yu, W.; Ding, Z.; Liu, L.; Wang, X.; Crossley, R. Petri net-based methods for analyzing structural security in e-commerce business processes. Future Gener. Comput. Syst. 2020, 109, 611–620. [Google Scholar] [CrossRef]
- Ben Attia, H.; Kahloul, L.; Benhazrallah, S.; Bourekkache, S. Using hierarchical timed colored petri nets in the formal study of TRBAC security policies. Int. J. Inf. Secur. 2020, 19, 163–187. [Google Scholar] [CrossRef]
- Tiwari, N.; Hubballi, N. Secure Socket Shell Brute Force Attack Detection with Petri Net Modeling. IEEE Trans. Netw. Serv. Manag. 2023, 20, 697–710. [Google Scholar] [CrossRef]
- Liu, H.; You, J.; Li, Z.; Tian, G. Fuzzy Petri nets for knowledge representation and reasoning: A literature review. Eng. Appl. Artif. Intell. 2017, 60, 45–56. [Google Scholar] [CrossRef]
- Lin, Y.; Yang, C.; Wang, S.; Chiou, G.; Shen, V.; Tung, Y.; Shen, F.; Cheng, H. Development and evaluation of an intelligent system for calibrating karaoke lyrics based on fuzzy Petri nets. Appl. Artif. Intell. 2022, 36, 2110699. [Google Scholar] [CrossRef]
- Shi, H.; Wang, L.; Li, X.; Liu, H. A novel method for failure mode and effects analysis using fuzzy evidential reasoning and fuzzy Petri nets. J. Ambient Intell. Humaniz. Comput. 2020, 11, 2381–2395. [Google Scholar] [CrossRef]
- Yue, W.; Wan, X.; Li, S.; Ren, H.; He, H. Simplified Neutrosophic Petri Nets Used for Identification of Superheat Degree. Int. J. Fuzzy Syst. 2022, 24, 3431–3455. [Google Scholar] [CrossRef]
- Murata, T. Petri nets: Properties, analysis and applications. Proc. IEEE 1989, 77, 541–580. [Google Scholar] [CrossRef]
- Atanassov, K.; Andonov, V. Generalized nets and intuitionistic fuzzy pairs as tools for modelling of flexible manufacturing systems. Notes Intuition. Fuzzy Sets 2020, 26, 40–69. [Google Scholar] [CrossRef]
- Atanassov, K. Generalized nets and intuitionistic fuzziness as tools for modeling of data mining processes and tools. Notes Intuition. Fuzzy Sets 2020, 26, 9–52. [Google Scholar] [CrossRef]
- Orozova, D.; Hristova, N. Generalized net model for dynamic decision making and prognoses. In Proceedings of the IEEE International Symposium on Electrical Apparatus & Technologies, Burgas, Bulgaria, 3–6 June 2020; pp. 1–4. [Google Scholar]
- Stratiev, D.; Dimitriev, A.; Stratiev, D.; Atanassov, K. Modeling the Production Process of Fuel Gas, LPG, Propylene, and Polypropylene in a Petroleum Refinery Using Generalized Nets. Mathematics 2023, 11, 3800. [Google Scholar] [CrossRef]
- Boyukov, T.; Atanassov, K. Generalized Nets as a Tool for Modelling of Railway Networks: Part 2. In Uncertainty and Imprecision in Decision Making and Decision Support: New Advances, Challenges, and Perspectives, Proceedings of the International Workshop on Intuitionistic Fuzzy Sets and Generalized Nets, Warsaw, Poland, 10–11 December 2020; Springer International Publishing: Cham, Switzerland, 2020; pp. 120–128. [Google Scholar]
- Stratiev, D.; Zoteva, D.; Atanassov, K. Modelling the process of production of automotive gasoline by the use of Generalized Nets. In Uncertainty and Imprecision in Decision Making and Decision Support: New Advances, Challenges, and Perspectives, Proceedings of the International Workshop on Intuitionistic Fuzzy Sets and Generalized Nets, Warsaw, Poland, 10–11 December 2020; Springer International Publishing: Cham, Switzerland, 2020; pp. 349–365. [Google Scholar]
- Rawal, B.; Manogaran, G.; Peter, A. Firewalls. In Cybersecurity and Identity Access Management; Springer Nature: Singapore, 2022; pp. 117–128. [Google Scholar]
- Valijonovich, T.; Safoev, N. A Brief Overview of Packet Classification Techniques in Computer Networks. Tex. J. Eng. Technol. 2023, 18, 60–62. [Google Scholar]
- Coscia, A.; Dentamaro, V.; Galantucci, S.; Maci, A.; Pirlo, G. An innovative two-stage algorithm to optimize Firewall rule ordering. Comput. Secur. 2023, 134, 103423. [Google Scholar] [CrossRef]
- Lyu, Y.; Feng, Y.; Sakurai, K. A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection. Information 2023, 14, 191. [Google Scholar] [CrossRef]
- Rajaboevich, G.; Dilbar, K.; Azatovna, A.; Ismoilovna, Q. Comparative Analysis of Methods Content Filtering Network Traffic. Int. J. Emerg. Trends Eng. Res. 2020, 8, 1561–1569. [Google Scholar] [CrossRef]
- Kim, M. A Study on the Attack Index Packet Filtering Algorithm Based on Web Vulnerability. In Big Data, Cloud Computing, and Data Science Engineering; Springer International Publishing: Cham, Switzerland, 2023; pp. 145–152. [Google Scholar]
- Kailanya, E.; Mwadulo, M.; Omamo, A. Dynamic deep stateful firewall packet analysis model. Afr. J. Sci. Technol. Soc. Sci. 2022, 1, 116–123. [Google Scholar] [CrossRef]
- Hitchcock, K. Access Control. In The Enterprise Linux Administrator: Journey to a New Linux Career; Apress: Berkeley, CA, USA, 2022; pp. 161–192. [Google Scholar]
- Sikos, L. Packet analysis for network forensics: A comprehensive survey. Forensic Sci. Int. Digit. Investig. 2020, 32, 200892. [Google Scholar]
- Nife, F.; Kotulski, Z. Application-aware firewall mechanism for software defined networks. J. Netw. Syst. Manag. 2020, 28, 605–626. [Google Scholar]
- Sundareswaran, N.; Sasirekha, S. Packet filtering mechanism to defend against DDoS attack in blockchain network. In Evolutionary Computing and Mobile Sustainable Networks, Proceedings of the International conference on Evolutionary Computing and Mobile Sustainable Networks, Bangalore, India, 28–29 September 2021; Springer: Singapore, 2022; pp. 201–214. [Google Scholar]
- Abdulhassan, A.; Shubbar, R.; Alhisnawi, M. Cuckoo filter based IP packet filtering using M-tree. Bull. Electr. Eng. Inform. 2023, 12, 958–968. [Google Scholar] [CrossRef]
- Sreelaja, N. A Fireworks-Based Approach for Efficient Packet Filtering in Firewall. In Handbook of Research on Fireworks Algorithms and Swarm Intelligence; IGI Global: Hershey, PA, USA, 2020; pp. 315–333. [Google Scholar]
- Asai, H. PALMTRIE: A ternary key matching algorithm for IP packet filtering rules. In Proceedings of the 16th International Conference on Emerging Networking Experiments and Technologies, Barcelona, Spain, 1–4 December 2020; pp. 323–335. [Google Scholar]
- Sičić, I.; Slovenec, K.; Petricioli, L.; Mikuc, M. Comparison of cuckoo hash table and bloom filter for fast packet filtering using data plane development kit. In Proceedings of the International Conference on Software, Telecommunications and Computer Networks, Split, Croatia, 19–21 September 2019; pp. 1–5. [Google Scholar]
- Pradhan, P.; Mannepalli, P. Machine Leaning for Flow Based Intrusion Detection Using Extended Berkley Packet Filter. Int. J. Eng. Res. Curr. Trends 2021, 3, 5–7. [Google Scholar]
- Cheng, J.; Li, C. Design and Implementation of TLS Traffic Packet Filtering Technology Based on Net filter Framework. In Proceedings of the International Conference on Cyber Security and Information Engineering, Brisbane, Australia, 23–25 September 2022; pp. 18–22. [Google Scholar]
- Liang, J.; Chen, L.; Li, Z.; Bai, J. Container Network Performance Anomaly Detection Based on Extended Berkeley Packet Filter and Machine Learning. In Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery, Proceedings of the International Conference on Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery, Guiyang, China, 24–26 July 2021; Springer International Publishing: Berlin/Heidelberg, Germany, 2022; pp. 1403–1415. [Google Scholar]
- Zhang, X.; Chen, L.; Bai, J. SYN Flood Attack Detection and Defense Method Based on Extended Berkeley Packet Filter. In Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery, Proceedings of the International Conference on Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery, Guiyang, China, 24–26 July 2021; Springer International Publishing: Berlin/Heidelberg, Germany, 2022; pp. 1416–1427. [Google Scholar]
- Dayal, M.; Chawla, A.; Khari, M.; Mahajan, A. Artificial Intelligence-Based Smart Packet Filter. In Proceedings of Third International Conference on Computing, Communications, and Cyber-Security; Springer Nature: Singapore, 2022; pp. 791–801. [Google Scholar]
- Fiessler, A.; Lorenz, C.; Hager, S.; Scheuermann, B.; Moore, A. Hypafilter+: Enhanced hybrid packet filtering using hardware assisted classification and header space analysis. EEE/ACM Trans. Netw. 2017, 25, 3655–3669. [Google Scholar] [CrossRef]
- Lotfollahi, M.; Jafari, M.; Shirali, R.; Saberian, M. Deep packet: A novel approach for encrypted traffic classification using deep learning. Soft Comput. 2020, 24, 1999–2012. [Google Scholar]
- Shin, Y.; Koo, D.; Hur, J. Inferring firewall rules by cache side-channel analysis in network function virtualization. In Proceedings of the International Conference on Computer Communications, Toronto, ON, Canada, 6–9 July 2020; pp. 1798–1807. [Google Scholar]
- Li, W.; Meng, W.; Wang, Y.; Li, J. Enhancing Blacks List-Based Packet Filtration Using Blockchain in Wireless Sensor Networks. In Wireless Algorithms, Systems, and Applications, Proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, Part II, Nanjing, China, 25–27 June 2021; Springer International Publishing: Berlin/Heidelberg, Germany, 2021; pp. 624–635. [Google Scholar]
- Peng, H.; Gao, D.; Yang, M.; Ma, J. An Efficient Firewall Application Using Learned Cuckoo Filter. In Emerging Networking Architecture and Technologies, Proceedings of the International Conference on Emerging Networking Architecture and Technologies, Shenzhen, China, 15–17 November 2022; Springer Nature: Singapore, 2023; pp. 430–441. [Google Scholar]
- Botvinko, A.; Samouylov, K. Firewall Simulator Development for Performance Evaluation of Ranging a Filtration Rules Set. In Proceedings of the International Conference on Distributed Computer and Communication Networks, Moscow, Russia, 26–29 September 2022; Springer Nature: Cham, Switzerland, 2023; pp. 190–201. [Google Scholar]
- Karthikeyan, S.; Keerthivasan, M.; Lalitha, A.; Karan, R. Network Intrusion Detection System Based on Packet Filters. I-Manag. J. Comput. Sci. 2021, 9, 27–32. [Google Scholar] [CrossRef]
- Hussein, M. A Proposed Multi-Layer Firewall to Improve the Security of Software Defined Networks. Int. J. Interact. Mob. Technol. 2023, 17, 153–165. [Google Scholar] [CrossRef]
- Putra, N.; Riyanto, V.; Wijaya, G.; Herlinawati, N. Firewall Design Using Access Control List Method as Data Filtering. J. Mantik 2021, 5, 1684–1693. [Google Scholar]
- Ramprasath, J.; Seethalakshmi, V. Mitigation of malicious flooding in software defined networks using dynamic access control list. Wirel. Pers. Commun. 2021, 121, 107–125. [Google Scholar]
- Yaibuates, M.; Chaisricharoen, R. A combination of ICMP and ARP for DHCP malicious attack identification. In Proceedings of the International Conference on Digital Arts, Media and Technology, Pattaya, Thailand, 11–14 March 2020; pp. 15–19. [Google Scholar]
- Jaszcz, A.; Połap, D. AIMM: Artificial Intelligence Merged Methods for flood DDoS attacks detection. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 8090–8101. [Google Scholar]
- Shah, S.; Khan, F.; Ahmad, M. Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN. Comput. Commun. 2022, 182, 198–211. [Google Scholar] [CrossRef]
- Karunakaran, H.; Bhumireddy, V. Utilizing Neutrosophic Logic in the Design of a Smart Air-Conditioning System. Appl. Sci. 2022, 12, 9776. [Google Scholar]
- Ouallane, A.; Broumi, S.; Ayele, E.; Bakali, A.; Bahnasse, A.; Talea, M. Towards Intelligent Road Traffic Management Based on Neutrosophic Logic: A Brief Review. Neutrosophic Sets Syst. 2022, 51, 7. [Google Scholar]
- Kaur, G.; Garg, H. A novel algorithm for autonomous parking vehicles using adjustable probabilistic neutrosophic hesitant fuzzy set features. Expert Syst. Appl. 2023, 226, 120101. [Google Scholar]
- Mısır, O. Dynamic local path planning method based on neutrosophic set theory for a mobile robot. J. Braz. Soc. Mech. Sci. Eng. 2023, 45, 127. [Google Scholar]
- Pai, S.; Prabhu, R. Safety modelling of marine systems using neutrosophic logic. J. Eng. Marit. Environ. 2021, 235, 225–235. [Google Scholar]
- Naik, N.; Jenkins, P. Enhancing windows firewall security using fuzzy reasoning. In Proceedings of the 2016 14th International Conference on Dependable, Autonomic and Secure Computing, Auckland, New Zealand, 8–12 August 2016; pp. 263–269. [Google Scholar]
- Swapna, A.; Rahman, Z.; Rahman, M.; Akramuzzaman, M. Performance evaluation of fuzzy integrated firewall model for hybrid cloud based on packet utilization. In Proceedings of the IEEE International Conference on Computer Communication and the Internet, Wuhan, China, 13–15 October 2016; pp. 253–256. [Google Scholar]
- Naik, N.; Jenkins, P. Fuzzy reasoning based windows firewall for preventing denial of service attack. In Proceedings of the IEEE International Conference on Fuzzy Systems, Vancouver, BC, Canada, 24–29 July 2016; pp. 759–766. [Google Scholar]
- Naik, N.; Jenkins, P.; Kerby, B.; Sloane, J.; Yang, L. Fuzzy logic aided intelligent threat detection in cisco adaptive security appliance 5500 series firewalls. In Proceedings of the IEEE International Conference on Fuzzy Systems, Rio de Janeiro, Brazil, 8–13 July 2018; pp. 1–8. [Google Scholar]
- Gohain, B.; Chutia, R.; Dutta, P. A distance measure for optimistic viewpoint of the information in interval-valued intuitionistic fuzzy sets and its applications. Eng. Appl. Artif. Intell. 2023, 119, 105747. [Google Scholar]
- Patel, A.; Jana, S.; Mahanta, J. Construction of similarity measure for intuitionistic fuzzy sets and its application in face recognition and software quality evaluation. Expert Syst. Appl. 2023, 14, 21491. [Google Scholar]
- Dwivedi, A.; Kaliyaperumal, U.; Kuruvilla, J.; Thomas, A.; Shanthi, D.; Haldorai, A. Time-series data prediction problem analysis through multilayered intuitionistic fuzzy sets. Soft Comput. 2023, 27, 1663–1671. [Google Scholar] [PubMed]
- Yue, Q.; Zou, W.; Hu, W. A new theory of triangular intuitionistic fuzzy sets to solve the two-sided matching problem. Alex. Eng. J. 2023, 63, 57–73. [Google Scholar]
- Yazdi, M.; Kabir, S.; Kumar, M.; Ghafir, I.; Islam, F. Reliability Analysis of Process Systems Using Intuitionistic Fuzzy Set Theory. In Advances in Reliability, Failure and Risk Analysis; Springer Nature: Singapore, 2023; pp. 215–250. [Google Scholar]
- Dawadi, B.; Adhikari, B.; Srivastava, D. Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks. Sensors 2023, 23, 2073. [Google Scholar] [CrossRef]
- Liang, H.; Li, X.; Xiao, D.; Liu, J.; Zhou, Y.; Wang, A.; Li, J. Generative Pre-trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls. IEEE Trans. Dependable Secur. Comput. 2023, 1–25. [Google Scholar] [CrossRef]
- Sepczuk, M. Dynamic Web Application Firewall detection supported by Cyber Mimic Defense approach. J. Netw. Comput. Appl. 2023, 213, 103596. [Google Scholar]
- Li, J.; Fan, Y.; Bian, X.; Yuan, Q. Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT. Entropy 2023, 25, 616. [Google Scholar]
- Tudosi, A.; Graur, A.; Balan, D.; Potorac, A. Research on Security Weakness Using Penetration Testing in a Distributed Firewall. Sensors 2023, 23, 2683. [Google Scholar] [CrossRef]
- Botvinko, A.; Samouylov, K. Firewall simulation model with filtering rules ranking. In Proceedings of the Distributed Computer and Communication Networks: Control, Computation, Communications, Moscow, Russia, 14–18 September 2020; Springer International Publishing: Berlin/Heidelberg, Germany, 2020; pp. 533–545. [Google Scholar]
- Wang, C. Construction and Deployment of a Distributed Firewall-based Computer Security Defense Network. Int. J. Netw. Secur. 2023, 25, 89–94. [Google Scholar]
- Chakir, O.; Sadqi, Y.; Maleh, Y. Evaluation of Open-source Web Application Firewalls for Cyber Threat Intelligence. In Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence; River Publishers: Abingdon, UK, 2023; pp. 35–48. [Google Scholar]
- Islam, M.; Uddin, M.; Hossain, D.; Dulal, M.; Ahmed, D.; Shakil, M.; Moazzam, D.; Golam, M. Analysis and Evaluation of Network and Application Security Based on Next Generation Firewall. Int. J. Comput. Digit. Syst. 2023, 13, 193–202. [Google Scholar] [CrossRef]
- Lar, S.; Liao, X.; Rehman, A.; Qinglu, M. Proactive Security Mechanism and Design for Firewall. J. Inf. Secur. 2011, 2, 122–130. [Google Scholar] [CrossRef]
Packet Filtering Firewall Systems | Approach | Strengths | Limitations |
---|---|---|---|
Deep packet inspection [44,45,46,55,56,57] | Study of packet analysis approaches driven by artificial intelligence. | 1. Easy to install. 2. Faster than other firewall technologies because they perform fewer evaluations. | 1. Difficulty in setting up packet filtering rules for the router. 2. There is not any sort of user-based authentication. |
Cuckoo filter-based IP packet filtering [47,50,60] | Fusing two data structures into a single one that is optimized for IP packet filtering in terms of speed, scalability, and flexibility. | 1. Packet filters make use of current network routers. 2. Makes security transparent to end-users. | 1. Difficulty in setting up packet filtering rules for the router. 2. There is not any sort of user-based authentication. |
A Fireworks-Based Approach [48,49] | Sparks from the fireworks are used to determine which rule in the firewall rule set best fits the incoming packet. | 1. Ease of use. 2. Cost effective. | 1. User restriction. 2. Malware attack. 3. Difficulty in updating ACL. |
Berkley packet filter platform [51,53,54] | Uses a decision tree to assess whether or not a packet is malicious, taking the whole context of the network flow into consideration. | 1. Packet filters make use of current network routers. 2. Cost effective. | 1. Packet filters do not understand application layer protocols. 2. Packet-filtering routers are not very secure. |
Blacklist packet filter for WSNs [59] | A strong blacklist for limiting unwanted traffic is constructed with the use of blockchain technology. | 1. Promotes privacy and security. 2. Monitors network traffic. | 1. Lack of logging capabilities. 2. Challenging setup. 3. New rules may need to be added if an employee needs special requirements to connect to the internet. |
No | Source IP | Destination IP | Source Port | Destination Port | Protocol Type | Action |
---|---|---|---|---|---|---|
R1 | 203.117.102.15 | 193.170.92.3 | * | * | ICMP | Allow |
R2 | 203.117.175.6 | 193.170.75.7 | * | * | UDP | Allow |
R3 | 203.117.175.4 | 193.170.62.29 | * | * | TCP | Deny |
Rule | |||
---|---|---|---|
1 | High | Long | Moderate |
2 | Medium | Long | Moderate |
3 | Low | Long | Small |
4 | High | Short | Large |
5 | Medium | Short | Large |
6 | Low | Short | Moderate |
7 | High | Medium | Large |
8 | Medium | Medium | Moderate |
9 | Low | Medium | Moderate |
No | Source IP | Destination IP | Source Port | Destination Port | Protocol Type | Risk Value | Action |
---|---|---|---|---|---|---|---|
R1 | 203.117.102.15 | 193.170.92.3 | * | * | ICMP | 0.83 | Block |
R2 | 203.117.175.6 | 193.170.75.7 | * | * | UDP | 0.88 | Block |
R3 | 203.117.175.4 | 193.170.62.29 | * | * | TCP | 0.25 | Block |
Rule | |||
---|---|---|---|
1 | High | Low | High Accept |
2 | High | High | Equal |
3 | High | Medium | High Accept |
4 | Low | Low | Equal |
5 | Low | High | High Reject |
6 | Low | Medium | High Reject |
7 | Medium | Low | Equal |
8 | Medium | High | High Reject |
9 | Medium | Medium | Equal |
No. of Packets | 500 | 1000 | 2000 | 3000 | 4000 | 5000 |
---|---|---|---|---|---|---|
ACL Random Sequence | 40 | 60 | 110 | 200 | 280 | 320 |
ACL Rearranged Sequence (suggested model) | 15 | 25 | 35 | 60 | 75 | 90 |
Threshold | 0 | 0.2 | 0.4 | 0.6 | 0.8 | 1 |
---|---|---|---|---|---|---|
Neutrosophic-based filtering | 0.94 | 0.93 | 0.91 | 0.90 | 0.85 | 0.83 |
Fuzzy-based filtering | 0.71 | 0.71 | 0.67 | 0.67 | 0.65 | 0.56 |
Traditional filtering | 0.52 | 0.51 | 0.38 | 0.34 | 0.29 | 0.15 |
Threshold | 0 | 0.2 | 0.4 | 0.6 | 0.8 | 1 |
---|---|---|---|---|---|---|
Neutrosophic-based filtering | 0.06 | 0.08 | 0.10 | 0.12 | 0.14 | 0.17 |
Fuzzy-based filtering | 0.32 | 0.35 | 0.39 | 0.42 | 0.42 | 0.42 |
Traditional filtering | 0.62 | 0.64 | 0.65 | 0.68 | 0.71 | 0.83 |
Threshold | 0 | 0.2 | 0.4 | 0.6 | 0.8 | 1 |
---|---|---|---|---|---|---|
Neutrosophic-based filtering | 0.97 | 0.97 | 0.97 | 0.92 | 0.91 | 0.89 |
Fuzzy-based filtering | 0.82 | 0.84 | 0.84 | 0.86 | 0.86 | 0.87 |
Traditional filtering | 0.62 | 0.62 | 0.64 | 0.65 | 0.71 | 0.78 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Madhloom, J.K.; Noori, Z.H.; Ebis, S.K.; Hassen, O.A.; Darwish, S.M. An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets. Computers 2023, 12, 202. https://doi.org/10.3390/computers12100202
Madhloom JK, Noori ZH, Ebis SK, Hassen OA, Darwish SM. An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets. Computers. 2023; 12(10):202. https://doi.org/10.3390/computers12100202
Chicago/Turabian StyleMadhloom, Jamal Khudair, Zainab Hammoodi Noori, Sif K. Ebis, Oday A. Hassen, and Saad M. Darwish. 2023. "An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets" Computers 12, no. 10: 202. https://doi.org/10.3390/computers12100202
APA StyleMadhloom, J. K., Noori, Z. H., Ebis, S. K., Hassen, O. A., & Darwish, S. M. (2023). An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets. Computers, 12(10), 202. https://doi.org/10.3390/computers12100202