Skip to main content

Advertisement

Log in

Genetic algorithm for effective open port selection for a web filter

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

As cyber security is a major challenge in the widespread deployment of the latest technologies, the importance of selecting the open ports for a given web filter cannot be overemphasized. A network administrator would want to select a combination of ports that would be most beneficial to the users and these ports would be treated as least vulnerable. However, this is not a trivial task and can be very time-consuming, O(n!), if brute force or other naïve approaches are used to select a given number of ports from 65,536 ports available. As genetic algorithms (GAs) are commonly used to obtain near-optimal solution for complex and time-consuming tasks, this paper proposes a GA for the selection of open ports for a web filter. The gene value for each port is based on the malicious issues associated with the port and the importance of the port to the client using the web filter. The proposed algorithm is implemented in Java, and the simulation results show that GA is very accurate in identifying open ports for a given web filter.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Goldberg D, Karp B, Ke Y, Nath S, Seshan S (1989) Genetic algorithms in search, optimization, and machine learning. Addison-Wesley, Reading

    MATH  Google Scholar 

  2. McHugh J (2001) Intrusion and intrusion detection. Int J Inf Secur (IJIS) 1:14–35

    MATH  Google Scholar 

  3. Wang X, Sang Y, Liu Y, Luo Y (2011) Considerations on security and trust measurement for virtualized environment. J Convergence (JoC) FTRA 2(2):19–24

    Google Scholar 

  4. Aikebaier A, Enokido T, Takizawa M (2011) Trustworthy group making algorithm in distributed systems. Human-centric Comput Inf Sci (HCIS) 1:6

    Article  Google Scholar 

  5. Nivedita N, Dharaskar RV (2010) An effective approach to network intrusion detection system using genetic algorithm. Int J Comput Appl 1(3):26–32

    Google Scholar 

  6. Li W (2004) Using genetic algorithm for network intrusion detection. In: Proceedings of the United States Department of Energy Cyber Security Group 2004 training conference, Kansas, pp 1–8

  7. Whitley D (1994) A genetic algorithm tutorial. Stat Comput 4:65–85

    Article  Google Scholar 

  8. Paxson V (1998) Bro: a system for detecting network intruders in real-time. In: Proceedings of 7th USENIX security symposium, San Antonio, TX, pp 31–51

  9. Bridges SM, Vaughn RB (2000) Intrusion detection via fuzzy data mining. In: Proceedings of 12th annual Canadian information technology security symposium, Ottawa, Canada, pp 109–122

  10. Chuan D, Lin Y, Linru M, Yua C (2011) Towards a practical and scalable trusted software dissemination system. J Convergence (JoC), FTRA 2(1):53–60

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank the Internet Assigned Number Authority and speedguide.net for invaluable information on ports used in the implementation of this project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sang-Soo Yeo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hussain, S., Olayemi, A. & Yeo, SS. Genetic algorithm for effective open port selection for a web filter. Pers Ubiquit Comput 17, 1693–1698 (2013). https://doi.org/10.1007/s00779-012-0602-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-012-0602-6

Keywords

Navigation