Skip to main content

Firewall Filtering Technology and Application Based on Decision Tree

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12737))

Included in the following conference series:

Abstract

In recent years, with the development of computer technology and communication technology, computer networks have developed rapidly to become an indispensable part of people's lives. In the same time, network attacks have been increasing exponentially. Countries around the world have raised network security issues to the height of their national strategies, which shows the importance of network security. Firewall is an important technology for network security at present, and it is a barrier to protect the internal network. However, in the era of information explosion, the data flow of network communication is very large, due to the limitations of memory, CPU, etc., firewalls will become a communication bottleneck. Therefore, this paper introduces the idea of machine learning into the filtering rules of the decision tree, and uses the optimized decision tree C4.5 algorithm to predict the optimal ranking of the firewall filtering rule table attributes, which improves the efficiency of the firewall and thus the throughputs of the firewall.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xiren, X.: Computer Network. Electronic Industry Press, Beijing (2009)

    Google Scholar 

  2. Noonan, W., Dubrawsky, I.: Firewall Foundation. People’s Posts and Telecommunications Press, Beijing (2007)

    Google Scholar 

  3. Xiangbin, H., Cong, Z.: Research on dynamic optimization of firewall rules based on Huffman tree. Comput. Moderniz. 8, 207–215 (2010)

    Google Scholar 

  4. Li, Z.: Research on Firewall Optimization Based on Statistical Analysis Method. Chongqing University, Chongqing (2011)

    Google Scholar 

  5. Anxi, R., Shoubao, Y., Hongwei, L.: A firewall rule matching optimization method based on statistical analysis. Comput. Eng. Appl. 42(4), 162–164 (2006)

    Google Scholar 

  6. Qingwei, Z., Aiying, F.: Firewall Technical Standard Course. Beijing Institute of Technology Press, Beijing (2010)

    Google Scholar 

  7. Malik, S.: CCIE#4955.2 Principles and Practice of Network Security. Beijing: People's Posts and Telecommunications Press (2008)

    Google Scholar 

  8. Qun, W.: Extraordinary Network Management-Network Foundation. People's Posts and Telecommunications Press, Beijing (2006)

    Google Scholar 

  9. Jiawei, H.: Data Mining: Concept and Technology. Mechanical Industry Press, Beijing (2012)

    Google Scholar 

  10. Jing, Y., Nannan, Z., Jian, L., Yanming, L., Meihong, L.: Research and application of decision tree algorithm. Comput. Technol. Dev. 20(02), 114–116+120 (2010)

    Google Scholar 

  11. Shaorong, F.: Research and improvement of decision tree algorithm. J. Xiamen Univ. (Nat. Sci. Ed.) 04, 496–500 (2007)

    MATH  Google Scholar 

  12. Sun Lin, X., Jiucheng, M.Y.: Decision tree rule extraction method based on new conditional entropy. Comput. Appl. 04, 884–887 (2007)

    Google Scholar 

  13. Jingqiong, Z.: Research on Firewall Technology Based on Learning. Nanjing University of Science and Technology, Nanjing (2004)

    Google Scholar 

  14. Weiping, W., Wenhui, C., Zupeng, L., Huaping, C.: Firewall policy inconsistency detection algorithm. J. Graduate Univ. Chin. Acad. Sci. 24(3), 378 (2007)

    Google Scholar 

  15. Jiaye, W., Jiwu, J., Sencun, Z. Security research of packet filtering firewall. Comput. Sci. 1999(08): 34–36+42 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jin, Y., Wang, Q. (2021). Firewall Filtering Technology and Application Based on Decision Tree. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12737. Springer, Cham. https://doi.org/10.1007/978-3-030-78612-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78612-0_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78611-3

  • Online ISBN: 978-3-030-78612-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics