Abstract
As cyber security is a major challenge in the widespread deployment of the latest technologies, the importance of selecting the open ports for a given web filter cannot be overemphasized. A network administrator would want to select a combination of ports that would be most beneficial to the users and these ports would be treated as least vulnerable. However, this is not a trivial task and can be very time-consuming, O(n!), if brute force or other naïve approaches are used to select a given number of ports from 65,536 ports available. As genetic algorithms (GAs) are commonly used to obtain near-optimal solution for complex and time-consuming tasks, this paper proposes a GA for the selection of open ports for a web filter. The gene value for each port is based on the malicious issues associated with the port and the importance of the port to the client using the web filter. The proposed algorithm is implemented in Java, and the simulation results show that GA is very accurate in identifying open ports for a given web filter.
Similar content being viewed by others
References
Goldberg D, Karp B, Ke Y, Nath S, Seshan S (1989) Genetic algorithms in search, optimization, and machine learning. Addison-Wesley, Reading
McHugh J (2001) Intrusion and intrusion detection. Int J Inf Secur (IJIS) 1:14–35
Wang X, Sang Y, Liu Y, Luo Y (2011) Considerations on security and trust measurement for virtualized environment. J Convergence (JoC) FTRA 2(2):19–24
Aikebaier A, Enokido T, Takizawa M (2011) Trustworthy group making algorithm in distributed systems. Human-centric Comput Inf Sci (HCIS) 1:6
Nivedita N, Dharaskar RV (2010) An effective approach to network intrusion detection system using genetic algorithm. Int J Comput Appl 1(3):26–32
Li W (2004) Using genetic algorithm for network intrusion detection. In: Proceedings of the United States Department of Energy Cyber Security Group 2004 training conference, Kansas, pp 1–8
Whitley D (1994) A genetic algorithm tutorial. Stat Comput 4:65–85
Paxson V (1998) Bro: a system for detecting network intruders in real-time. In: Proceedings of 7th USENIX security symposium, San Antonio, TX, pp 31–51
Bridges SM, Vaughn RB (2000) Intrusion detection via fuzzy data mining. In: Proceedings of 12th annual Canadian information technology security symposium, Ottawa, Canada, pp 109–122
Chuan D, Lin Y, Linru M, Yua C (2011) Towards a practical and scalable trusted software dissemination system. J Convergence (JoC), FTRA 2(1):53–60
Acknowledgments
The authors would like to thank the Internet Assigned Number Authority and speedguide.net for invaluable information on ports used in the implementation of this project.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hussain, S., Olayemi, A. & Yeo, SS. Genetic algorithm for effective open port selection for a web filter. Pers Ubiquit Comput 17, 1693–1698 (2013). https://doi.org/10.1007/s00779-012-0602-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-012-0602-6