their firewall rules safely with the capability to detect
anomalies in the rule set. In our work, knowledge
graph is formulated as predicate calculus rules to
provide solid mathematical representation for the
existing anomalies, which in turn bridges the gap in
developing automation tools and effective solutions.
As a methodology, a general pattern for each anomaly
has been formally defined, and then the cases satisfied
each general pattern have been presented and
analysed to ensure that our method covers all possible
scenarios of well-know firewall rules’ anomalies.
As a future work, we will implement a handy
solution for our approach, including a solver for
automatic knowledge extraction from the predicate
calculus rules, which will be connected to KgBase, a
knowledge graph builder free tool. On the other hand,
the work in (Nguyen & Sakama, 2019) will be used
to prove the generalization of our approach.
REFERENCES
Boudriga, N. (2017). Security of Mobile Communications.
In Proceedings of the IEEE International Conference
on Signal Processing and Communications. IEEE.
Chao, C. (2018). A Feasible Anomaly Diagnosis
Mechanism for Stateful Firewall Rules. In Proceedings
of the 27th International Conference on Computer
Communication and Networks (ICCCN). IEEE.
Voronkov, A., Iwaya, L., Martucci, L., Lindskog, S. (2018).
Systematic Literature Review on Usability of Firewall
Configuration. IN ACM Computing Surveys, issue 6,
ISSN 0360-0300. ACM.
Hu, H., Ahn, G., Kulkarni, K. (2012). Detecting and
Resolving Firewall Policy Anomalies. In IEEE
Transactions on Dependable and Secure Computing,
issue 3, pp. 318-331. IEEE.
Abbes, T., Bouhoula, A., Rusinowitch, M. (2016).
Detection of Firewall Configuration Errors with
Updatable Tree. In International Journal of Information
Security, issue 15, pp. 301-317. SpringerLink.
As-Suhbani H., Khamitkar, S. (2017). Using Data Mining
for Discovering Anomalies from Firewall Logs: a
Comprehensive Review. In International Research
Journal of Engineering and Technology (IRJET), vo. 4,
issue 11, pp. 419-423.
Ahmed, Z., and Askari, S. (2018). Firewall Rule Anomaly
Detection: A Survey. In International Journal of
Computational Intelligence & IoT, vo. 2, pp. 722-727.
SSRN.
Karafili, E., Valenza, F., Chen, Y., Lupu, E. (2020).
Towards a Framework for Automatic Firewalls
Configuration via Argumentation Reasoning. In
Proceedings of the IEEE/IFIP Network Operations and
Management Symposium (NOMS). IEEE.
Elfaki, A., Aljaedi, A., Duan, Y. (2019). Mapping ERD to
knowledge graph. In Proceedings of the IEEE World
Congress on Services (SERVICES). IEEE.
Von, V., Cao, S., Di, X., Gong, Y., Ren, W., Zhang, X.
(2020). Knowledge Extraction and Knowledge Graph
Construction Based on Campus Security Logss. In
Proceedings of the 6th International Conference on
Artificial Intelligence and Security. SpringerLink.
Wang, Z., Zhu, H., Liu, P., Sun, L. (2021). Social
Engineering in Cybersecurity: a Domain Ontology and
Knowledge Graph Application Examples. In
Cybersecurity, no. 31, pp. 1-21. https://doi.org/
10.1186/ s42400-021-00094-6
Wang, Y., Sun, Z., Han, Y. (2021). Network Attack Path
Prediction Based on Vulnerability Data and Knowledge
Graph. In International Journal of Innovative
Computing, Information and Control, vo. 17, no. 5.
http://www.ijicic.org/ ijicic-170518.pdf
Nguyen, H., Sakama, C. (2019). A New Algorithm for
Computing Least Generalization of a Set of Atoms. In
Proceedings of the International Conference on
Inductive Logic Programming. SpringerLink.
Kim, T., Kwon, T., Lee, J., Song, J. (2021). F/Wvis:
Hierarchical Visual Approach for Effective
Optimization of Firewall Policy. In IEEE Access, vo. 9,
pp. 105989 – 106004. IEEE.