skip to main content
10.1145/2007052.2007094acmconferencesArticle/Chapter ViewAbstractPublication PagesacaiConference Proceedingsconference-collections
research-article

Artificial intelligent firewall

Published: 21 July 2011 Publication History

Abstract

Firewalls are now an integral part of network security. An intelligent firewall that prevents unauthorized access to a system has been developed. Artificial intelligence applications are uniquely suited for the ever-changing, ever-evolving world of network security. Typical firewalls are only as good as the information provided by the Network Administrator. A new type of attack creates vulnerabilities, which a static firewall does not have the ability to avoid without human direction. An AI-managed firewall service, however, can protect a computer network from known and future threats. We report in this paper on research in progress concerning the integration of different security techniques. A main purpose of the project is to integrate a smart detection engine into a firewall. The smart detection engine will aim at not only detecting anomalous network traffic as in classical IDSs, but also detecting unusual structures data packets that suggest the presence of virus data. We will report in this paper on the concept of an intelligent firewall that contains a smart detection engine for potentially malicious data packets.

References

[1]
Anup K. Ghosh and Aaron Schwartzbard: A study in using neural networks for anomaly and misuse detection. 1999. http://www.docshow.net/ids/usenixsec99.zip
[2]
CERT Advisory CA-2001-23: Continued Threat of the "Code Red" Worm. 2002. http://www.cert.org/advisories/CA-2001-23.html
[3]
D. Dittrich: The "stacheldraht" distributed denial of service attack tool. December 1999. http://staff.washington.edu/dittrich/misc/stacheldraht.analysis.
[4]
D. Dittrich: The "Tribe Flood Network" distributed denial of service attack tool. October 1999. http://staff.washington.edu/dittrich/misc/tfn.analysis
[5]
D. Dittrich: The DoS Project's "trinoo" distributed denial of service attack tool. October 1999. http://staff.washington.edu/dittrich/misc/trinoo.analysis.
[6]
James Cannady and James Mahaffey: The application of artificial neural networks to misuse detection: initial results. In: Proceedings of the 1st International Workshop on Recent Advances in Intrusion Detection (RAID 1998), 1998.
[7]
L-117: The Code Red Worm, U. S. Department of Energy. CIAC (Computer Incident Advisory Capability), July 19, 2001. http://www.ciac.org/ciac/bulletins/1-117.shtml
[8]
LIBPCAP: The Tcpdump Group. http://www.tcpdump.org
[9]
M. Swimmer: Review and Outlook of the Detection of Viruses using Intrusion Detection Systems. In: Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection (RAID 2000)

Cited By

View all
  • (2019)A Rule-Based Training for Artificial Neural Network Packet Filtering Firewall2019 6th International Conference on Systems and Informatics (ICSAI)10.1109/ICSAI48974.2019.9010431(1010-1014)Online publication date: Nov-2019
  • (2018)Comparison of shallow and deep neural networks for network intrusion detection2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)10.1109/CCWC.2018.8301755(204-208)Online publication date: Jan-2018
  • (2017)Endpoint firewall for local security hardening in academic research environmentJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-16914332:2(1475-1484)Online publication date: 1-Jan-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ACAI '11: Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
July 2011
248 pages
ISBN:9781450306355
DOI:10.1145/2007052
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 July 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. intelligent detection engine
  2. network security systems
  3. neural network model
  4. pattern recognition artificial intelligence

Qualifiers

  • Research-article

Conference

ACAI '11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 173 of 395 submissions, 44%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)65
  • Downloads (Last 6 weeks)1
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2019)A Rule-Based Training for Artificial Neural Network Packet Filtering Firewall2019 6th International Conference on Systems and Informatics (ICSAI)10.1109/ICSAI48974.2019.9010431(1010-1014)Online publication date: Nov-2019
  • (2018)Comparison of shallow and deep neural networks for network intrusion detection2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)10.1109/CCWC.2018.8301755(204-208)Online publication date: Jan-2018
  • (2017)Endpoint firewall for local security hardening in academic research environmentJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-16914332:2(1475-1484)Online publication date: 1-Jan-2017
  • (2016)Incorporating leading-edge technologies in an artificial intelligence courseJournal of Computing Sciences in Colleges10.5555/3015063.301508632:2(149-156)Online publication date: 1-Dec-2016
  • (2015)Endpoint Firewall for Local Security Hardening in Academic Research EnvironmentComputational Collective Intelligence10.1007/978-3-319-24306-1_24(246-255)Online publication date: 24-Oct-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media