American Journal of Computer Science and Technology

Submit a Manuscript

Publishing with us to make your research visible to the widest possible audience.

Propose a Special Issue

Building a community of authors and readers to discuss the latest research and develop new ideas.

Research Article |

Improving Internet Firewall Using Machine Learning Techniques

Internet firewalls are a composite of both hardware and software components, which are employed to enforce a security policy dictating the movement of data between many networks. Conventional firewalls depend on pre-established rules and signatures in order to identify and prevent the transmission of harmful network traffic. Nevertheless, it is worth noting that the aforementioned regulations and authentication methods frequently remain unchanging and can be effortlessly circumvented by highly skilled assailants. This analysis improves the use of firewall in detecting internet attacks using machine learning techniques. This study introduces a novel approach to enhance internet firewall efficacy through the integration of machine learning techniques. By leveraging a sophisticated model, the proposed system achieves exceptional performance, attaining a remarkable 99.99% precision, recall, and F1-score. This significant advancement in accuracy demonstrates the potential of employing machine learning in fortifying internet security infrastructure. The model's ability to consistently and reliably discern malicious activities from benign traffic showcases its robustness in real-world scenarios, thus presenting a promising avenue for bolstering network defense mechanisms. This research not only contributes to the burgeoning field of cybersecurity but also lays the foundation for future innovations in adaptive and intelligent firewall systems.

Firewall, Machine Learning, Cyber-Attacks, Response Policy

APA Style

Ozohu Musa, M., Victor-Ime, T. (2023). Improving Internet Firewall Using Machine Learning Techniques. American Journal of Computer Science and Technology, 6(4), 170-179. https://doi.org/10.11648/j.ajcst.20230604.14

ACS Style

Ozohu Musa, M.; Victor-Ime, T. Improving Internet Firewall Using Machine Learning Techniques. Am. J. Comput. Sci. Technol. 2023, 6(4), 170-179. doi: 10.11648/j.ajcst.20230604.14

AMA Style

Ozohu Musa M, Victor-Ime T. Improving Internet Firewall Using Machine Learning Techniques. Am J Comput Sci Technol. 2023;6(4):170-179. doi: 10.11648/j.ajcst.20230604.14

Copyright © 2023 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

1. Ahmed, M., Masud, M., & Mamun, A. (2020). Comparisons among multiple machine learning based classifiers for breast cancer risk stratification using electrical impedance spectroscopy. European Journal of Electrical Engineering and Computer Science, 4(4). https://doi.org/10.24018/ejece.2020.4.4.227
2. Sun, J., Zhong, G., Huang, K., & Dong, J. (2018). Banzhaf random forests: cooperative game theory based random forests with consistency. Neural Networks, 106, 20-29. https://doi.org/10.1016/j.neunet.2018.06.006
3. Zhang, W., Chen, X., Liu, Y., & Xi, Q. (2020). A distributed storage and computation k-nearest neighbor algorithm based cloud-edge computing for cyber-physical-social systems. Ieee Access, 8, 50118-50130. https://doi.org/10.1109/access.2020.2974764.
4. Al-Haija, Q. and Ishtaiwi, A. (2021). Machine learning based model to identify firewall decisions to improve cyber-defense. International Journal on Advanced Science Engineering and Information Technology, 11(4), 1688. https://doi.org/10.18517/ijaseit.11.4.14608
5. Jordan, M. and Mitchell, T. (2015). Machine learning: trends, perspectives, and prospects. Science, 349(6245), 255-260. https://doi.org/10.1126/science.aaa8415
6. Khonde, S. and Ulagamuthalvi, V. (2020). Hybrid architecture for distributed intrusion detection system using semi-supervised classifiers in ensemble approach. Advances in Modelling and Analysis B, 63(1-4), 10-19. https://doi.org/10.18280/ama_b.631-403
7. Dawadi, Babu R., Bibek Adhikari, and Devesh Kumar Srivastava. "Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks." Sensors 23, no. 4 (2023): 2073.
8. Applebaum, Simon, Tarek Gaber, and Ali Ahmed. "Signature-based and machine-learning-based web application firewalls: A short survey." Procedia Computer Science 189 (2021): 359-367.
9. Prabakaran, Senthil, Ramalakshmi Ramar, Irshad Hussain, Balasubramanian Prabhu Kavin, Sultan S. Alshamrani, Ahmed Saeed AlGhamdi, and Abdullah Alshehri. "Predicting attack pattern via machine learning by exploiting stateful firewall as virtual network function in an SDN network." Sensors 22, no. 3 (2022): 709.
10. Appelt, D., Nguyen, C. D., Panichella, A., & Briand, L. C. (2018). A machine-learning-driven evolutionary approach for testing web application firewalls. IEEE Transactions on Reliability, 67(3), 733-757.
11. Shaheed, Aref, and M. H. D. Kurdy. "Web Application Firewall Using Machine Learning and Features Engineering." Security and Communication Networks 2022 (2022).
12. Ito, Michiaki, and Hitoshi Iyatomi. "Web application firewall using character-level convolutional neural network." In 2018 IEEE 14th International Colloquium on Signal Processing & Its Applications (CSPA), pp. 103-106. IEEE, 2018.
13. Taylor, O. E., and P. S. Ezekiel. "A Robust System for Detecting and Preventing Payloads Attacks on Web-Applications Using Recurrent Neural Network (RNN)." European Journal of Computer Science and Information Technology 10, no. 4 (2022): 1-13.
14. Rajesh, Shriram, Marvin Clement, Sooraj SB, Al Shifan SH, and Jyothi Johnson. "Real-Time DDoS Attack Detection Based on Machine Learning Algorithms." Proceedings of the Yukthi (2021).
15. Lente, Caio, Roberto Hirata Jr, and Daniel Macêdo Batista. "An Improved Tool for Detection of XSS Attacks by Combining CNN with LSTM." In Anais Estendidos do XXI Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, pp. 1-8. SBC, 2021.
16. Karacan, Hacer, and Mehmet Sevri. "A novel data augmentation technique and deep learning model for web application security." IEEE Access 9 (2021): 150781-150797.
17. Uçar, E. and Ozhan, E. (2017). The analysis of firewall policy through machine learning and data mining. Wireless Personal Communications, 96(2), 2891-2909. https://doi.org/10.1007/s11277-017-4330-0
18. Breiman, L. (1996). Bagging predictors. Machine Learning, 24(2), 123-140. https://doi.org/10.1007/bf00058655
19. Cao, H., Sarlin, R., & Jung, A. (2020). Learning explainable decision rules via maximum satisfiability. Ieee Access, 8, 218180-218185. https://doi.org/10.1109/access.2020.3041040
20. Cutler, D., Edwards, T., Beard, K., Cutler, A., Hess, K., Gibson, J., … & Lawler, J. (2007). Random forests for classification in ecology. Ecology, 88(11), 2783-2792. https://doi.org/10.1890/07-0539.1
21. Kulkarni, V. and Sinha, P. (2012). Pruning of random forest classifiers: a survey and future directions. https://doi.org/10.1109/icdse.2012.6282329
22. Quinlan, J. (1986). Induction of decision trees. Machine Learning, 1(1), 81-106. https://doi.org/10.1007/bf00116251
23. Samworth, R. (2012). Optimal weighted nearest neighbour classifiers. The Annals of Statistics, 40(5). https://doi.org/10.1214/12-aos1049