Next Article in Journal
A New Application for Salted Water-Based Fluids with Palygorskite: Formulation Designing for Temporary Plug and Abandonment Operations of Petroleum Wells
Previous Article in Journal
Deep Defense Against Mal-Doc: Utilizing Transformer and SeqGAN for Detecting and Classifying Document Type Malware
Previous Article in Special Issue
The Implementation of a WebGPU-Based Volume Rendering Framework for Interactive Visualization of Ocean Scalar Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Development of an Anomaly Classification Model and a Decision Support Tool for Firewall Policy Configuration

1
Department of Bigdata, Chungbuk National University, Cheongju 28644, Republic of Korea
2
Department of Convergence Security, Chungbuk National University, Cheongju 28644, Republic of Korea
3
Department of Management Information Systems, Chungbuk National University, Cheongju 28644, Republic of Korea
4
Cybersecurity Economics Research Institute, Chungbuk National University, Cheongju 28644, Republic of Korea
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(6), 2979; https://doi.org/10.3390/app15062979
Submission received: 26 December 2024 / Revised: 21 February 2025 / Accepted: 4 March 2025 / Published: 10 March 2025
(This article belongs to the Special Issue Data Visualization Techniques: Advances and Applications)

Abstract

:
A firewall is a device that is used generally to prevent cyberattacks and protect internal assets by blocking unauthorized access. Information security managers have many difficulties in managing firewall policies due to errors or anomalies in the policy that are caused by frequent internal and external requests. This paper intends to develop an anomaly classification model to detect anomalies and measure the priority of resolution in firewall policy as well as a visualized tool that supports information security managers to manage their firewall policy efficiently. This model and tool help information security managers resolve anomalies in firewall policy, enable efficient firewall policy management, and protect internal assets effectively.

1. Introduction

A firewall is a security device that has been used since the 1990s to prevent network attacks and plays a very important role in network security by blocking unauthorized users. As IT technology develops and network attacks become more advanced and intelligent, a lot of advances in firewall functions or development of security equipment including firewalls are in progress. However, according to a report by Network World, which surveyed network company executives, 88% of respondents said they would prioritize adopting a firewall to defend against cyberattacks [1]. This shows that the firewall is still an important device. However, it is difficult to effectively respond to external attacks only by introducing a firewall, and for this purpose, the firewall policy must be properly configured. NIST’s SP 800-41 Rev.1 states that the information security manager should manage the organization’s firewall policy considering all assets identified through risk analysis [2]. In addition, the firewall policy is not fixed and can be changed depending on the situation and is frequently changed due to the addition, replacement, or removal of equipment, or requests from inside or outside the organization. However, information security managers are unable to perform risk analysis every time the asset status changes due to excessive work and are experiencing difficulties in firewall policy management due to problems arising from frequent changes in firewall policy [3].
The purpose of this study is to develop an anomaly classification model that detects and quantifies problems in firewall policy (hereafter anomalies) and presents resolution priorities to improve the difficulty of firewall policy management felt by information security managers. Earlier studies have suggested solutions to the degree of detecting, classifying, and deleting anomalies or changing the order of rules, and the market has developed functions including these contents and included them in firewalls. However, information security managers did not use it because they did not know that there was a policy inspection function in the firewall, or normal rules were misclassified as anomalies. In addition, according to a survey conducted by the authors on firewall policy management for public institutions, firewall policy is systematically and complexly connected to each other, and information security managers cannot easily change rules because they do not know how a changed rule will affect the organization’s service. Therefore, by developing a visualization tool capable of performing the anomaly classification model proposed in this study, the case of misclassifying the normal rule as an anomaly was classified as an exceptional rule, and an anomaly was detected by excluding it from the anomaly detection algorithm. Additionally, the properties of the anomaly were defined, and an index capable of quantitatively measuring the anomaly was developed. By analyzing the risk level of the anomaly through the proposed indicator and sorting it in order of risk level, it presents rules that need to be addressed urgently to the information security manager to help solve problems within the firewall policy efficiently.

2. Literature Review

2.1. Firewall

A firewall is a device that blocks unauthorized network packets by comparing the configured firewall policy with network packets. A firewall is a key element of network security and is widely used by most companies, public institutions, and governments [4].
The NIST 800-41 guide describes the technologies used in firewalls and classifies the types of firewalls according to their functions. Types of firewalls include packet filtering, state-based monitoring, application-proxy gateway, circuit-level gateway, and VPN [2]. Recently, as network attacks have become more intelligent, firewalls have also been advanced, and next-generation firewall is spreading in the market. A next-generation firewall has functions covering all types of firewalls, from existing packet filtering methods to VPNs, and it is a firewall that can be applied to data centers and clouds [5]. This paper aims to study the most basic packet filtering method of a firewall. According to Garcia-Alfaro et al. (2013), the packet filtering firewall has the advantage of being fast because it analyzes only low-layer information [6]. However, there is a problem in that it cannot analyze stream-type data, which is higher-layer data like a stateful firewall. The packet filtering method has problems that cannot be identified in the upper layer rather than the network layer among the seven OSI (Open System Interconnection) layers, but the firewall policy is based on the packet filtering method and is suitable for detecting problems within the policy and suggesting solutions.
The authors analyzed the functional specifications of representative firewalls of Korean domestic and foreign companies to check if there is a function that detects anomalies and resolves the anomaly in firewall policy. In Korean domestic companies, the most commonly used three firewall venders were selected: SECUI, AhnLab, and WINS. The most popular SECUI is a next-generation firewall that can use packet filtering and user ID-based authentication simultaneously. As for detailed functions, it is mentioned that it provides overlapping and unused rule-checking functions, but no other anomalies are mentioned [7]. In the case of AhnLab, the representative product is a next-generation firewall that maximizes firewall processing performance with its own developed packet processing technology. As for detailed functions, it provides duplicate object and rule filtering and provides a function to verify unused rules through various types of policy validation [8]. In the case of WINS, an intelligent next-generation firewall focused on threat tracking is the representative product. As a detailed function, there is a function to track the security policy usage status, so it is judged that overlapping and unused rules can be checked [9].
In the case of foreign companies, the functions of representative firewall products of companies included in the Leaders group of the 2021 Magic Quadrant for Network Firewalls issued by Gartner were analyzed [10]. Gartner’s Magic Quadrant categorizes the major players in a fast-growing market into four categories: Leaders, Visionaries, Challengers, and Niche Players. The Leaders category accounts for a large portion of the current market, and there are companies that can lead the field through R&D investment in the future. Therefore, we investigated whether the representative firewall of companies distributed in the Leaders category has the function to check for anomalies. Although many companies were included in the Leaders category, we analyzed the product brochures of the representative firewalls of the top three companies, Palo Alto Networks, Fortinet, and Check Point Software Technologies [11,12,13]. As a result, the Hit Count function that can check whether the rule is being used existed in all three companies’ firewalls. However, it was difficult to check other functions. In the case of Palo Alto Networks, it allows information security managers to manage firewall policy through an integrated policy editor and reduces user errors through rule configuration recommendations, so it can be expected that it will be possible to detect anomalies, but it is hard to find anomaly-detecting functions [11]. In the case of Fortinet, it is described that it can manage the firewall policy in an automation-oriented centralized way, but it is difficult to confirm because it is not mentioned how to manage the anomaly [12]. Lastly, in the case of Check Point Software Technologies, it is mentioned that integrated policy management is possible like the firewall of Palo Alto Networks or Fortinet, but it was not possible to confirm how to manage anomalies [13].
Through market research on firewalls by domestic and foreign companies, domestic companies provide a checking function for overlapping rules and unused rules, but it is difficult to check for other anomalies. On the other hand, it was difficult to find information related to the function of managing anomalies of representative foreign companies, and it can be assumed that the anomaly should be resolved by the information security manager himself.

2.2. Firewall Policy

The traffic consists of various types of information such as sequence number, protocol information, source IP, destination IP, source port, destination port, and packet arrival time and so on. The firewall policy consists of the protocol, source IP, destination IP, source port, and destination port among traffic information, and it additionally includes whether to block the packet. The firewall policy is divided into blacklist-based and whitelist-based according to the filtering method. The biggest difference between the two methods is the handling method for cases that are not included in the policy. A blacklist-based firewall policy allows all packets not included in the policy. On the other hand, a whitelist-based firewall policy rejects all packets not included in the policy. Most firewall policies adopt a whitelist basis to prevent unexpected attacks from the outside [2]. NIST’s 800-41 guideline also recommends reducing risk by blocking unknown access through ’deny by default’ based on a whitelist when configuring a firewall policy [2]. Therefore, this paper conducted a study to optimize the firewall policy for the whitelist-based firewall.
Firewall policy management is the main task of information security managers, and firewall policy configuration must be properly set to protect internal assets [2,14]. However, since the information security manager mainly performs more than one task, it is difficult to manage the firewall policy manually.

2.3. Firewall Policy Management

Research on firewall policy management has been going on for about 20 years. Al-Shaer and Hamed (2004) proposed a model to improve the complexity of the firewall policy by removing overlapping rules or anomalies in the firewall policy for effective firewall use [14]. Voronkov et al. (2020) defined four factors, such as cognitive errors of information security managers, the number of conflicts between rules, explanation of each rule, and the structural complexity of networks, to increase the usability of firewall rules through earlier studies [15]. Then, interviews were conducted with experts to verify the four factors. Al-Haj and Al-Shaer (2011) designed a set of three metrics to measure the security level of a firewall [16]. While they suggested metrics to measure the security level of a firewall, this study focuses on presenting indexes to measure the potential risk of anomalies in the firewall policy. Chomsiri et al. (2020) proposed a model in which firewall rules are arranged in order of high frequency at regular intervals in order to increase the processing speed of the firewall after eliminating conflicts between firewall rules [17]. The optimal rule alignment period was calculated based on five factors such as the number of rules, network speed, data size, transmission speed, and time required for firewall rule alignment, and then it was verified through testing. Hu et al. (2012) designed a framework to classify and manage anomalies in firewall policy [18]. Through this framework, the firewall policy was reordered to resolve anomalies, and the policy was optimized by classifying useless rules into four categories: removable, strong irremovable, weak irremovable and correlation. Yoon et al. (2010) tried to solve the structural complexity that exists in the firewall policy due to the complexity of the network [19]. They optimized the firewall policy by calculating the complexity of the network, deriving an optimal route from A to B, and applying it to the firewall policy. Wool (2010) improves on previous work on the complexity of firewall policy [20]. Previous work did not reflect that the greater the number of interfaces, the greater the complexity. For example, a firewall with more interfaces with the same number of rules is more complex. Togay et al. (2022) developed an anomaly classification algorithm that reduced processing time compared to earlier studies and shortened the time it takes to classify anomalies that exist in more than 1000 firewall rules [21]. Even in NIST’s SP 800-41 Rev. 1, it is mentioned that there is no right answer to configure a firewall policy, so it is necessary to analyze all network traffic and configure the firewall policy in detail [2]. It is recommended to reduce unnecessary rules by commenting on each rule so that others can find out why the rule was configured. Prior research on firewall policy management is summarized in Table 1.

2.4. Anomaly in Firewall Policy

In this section, the five types of anomalies in the firewall policy defined by Al-Shaer and Hamed (2004), such as shadowing, correlation, generalization, redundancy, and irrelevance, are summarized with formulas and examples [15].
  • Shadowing anomaly
    A shadowing anomaly occurs when the former rule includes the latter rule and each rule’s action is different. An example of a shadowing anomaly can be found in Table 2.
  • Correlation anomaly
    A correlation anomaly occurs when two rules include each other for different conditions. An example of a correlation anomaly can be found in Table 3.
  • Generalization anomaly
    A generalization anomaly occurs when the latter rule includes the former rule and each rule’s action is different. An example of a generalization anomaly can be found in Table 4.
  • Redundancy anomaly
    A redundancy anomaly occurs when one of the two rules is included in the other and each rule’s action is the same regardless of the order. An example of a redundancy anomaly can be found in Table 5.
  • Irrelevance anomaly
    The irrelevance anomaly was defined by Al-Shear and Hamed (2004). An irrelevance anomaly is a rule in which no packets are filtered by this rule. That is, it means an unused rule and corresponds to a rule in which the value of the counter variable in Table 6 is zero. However, the rule classified as an irrelevance anomaly was excluded from this study. It is too hard to obtain network traffic data for security reasons. An example of an irrelevance anomaly can be found in Table 6.
Al-Shear and Hamed (2004) summarized the classification of anomalies within the firewall policy [15]. However, in practice, there are rules that are classified as anomalies but are necessary. Therefore, in this study, we would like to propose a method that is distinguished by the exclusion of rules added out of necessity.

2.5. Difficulties in Managing Firewall Policy

We conducted a survey to check how to manage firewall policy and face difficulties with firewall policy management in the field. The questionnaire consists of the model of the firewall, the interval of firewall inspection and purpose of the inspection, the existence and use of a function capable of detecting anomalies in the firewall policy, the type of anomaly using the detection function, and difficulties in resolving the anomaly. Information security managers working in public institutions and information security service company employees who manage firewalls in public institutions were selected for the survey.
A total of 63 valid questionnaires were collected from the survey. The main result was that information security managers did not use the anomaly detection function because of the case where the normal rule was misclassified and too many problems occurred despite the presence of the anomaly detection function in the firewall policy. In addition, respondents know that there is an anomaly in the firewall policy, but respondents were worried about the side effect that may occur by modifying the firewall policy to solve the anomaly. The results of survey on the difficulties of managing firewall rules targeting information security managers were summarized into the following five difficulties in managing firewall policy.
  • Unnecessary rules: There are multiple managers of firewall policy management, overlapping rules due to the lack of skill or mistakes of the managers, or rules that are not related to the organization.
  • Excessive allowance rule: Risk analysis is not performed properly, so more than the permitted range is permitted, resulting in exposure to risks.
  • Number of rules to manage: There are too many firewall rules to manage, making it difficult to manage manually.
  • Frequent requests: Requests related to the addition, replacement, or removal of equipment occur frequently, making it difficult to manage manually (e.g., registering personal equipment due to telecommuting).
  • Problems in rules that are difficult to solve: There is anxiety that problems may arise when modifying rules due to complexly connected rules.
To solve these problems, Hu et al. (2012) tried to help information security managers by classifying anomalies and resolving anomalies through rule reordering and redundancy elimination strategies. Liu (2008) made it possible for the user to check what effect occurs within the policy as the rule is changed to solve the problem within the policy [22]. However, neither study considered exceptional rules that may affect each solution, and information security managers cannot determine which anomalies need to be addressed urgently.
In this study, we developed indicators based on the causes classified as anomalies. By quantitatively measuring the risk of anomalies based on indicators, it is intended to help solve problems within rules by showing high-risk anomalies to information security managers and informing solutions.

3. Methodology

3.1. Anomaly Classification Model

In this study, the tool to classify anomalies and measure priorities for resolution consists of two steps. In the first step, when the firewall policy is loaded into the visualization tool, the anomaly detection algorithm automatically classifies the exceptional rules configured for necessity, excludes them from the detection algorithm, and classifies the anomalies. In the second step, the cause of the detected anomaly is analyzed, the risk is quantitatively measured based on the criteria proposed in this study, and the result is visually displayed to information security managers. Our research model is shown in Figure 1.

3.2. Improved Anomaly Detection Algorithm

Existing studies tried to classify and solve anomalies in firewall rules, but in fact, rules according to necessity exist in firewall policies. Rules configured by necessity in the firewall policy can be divided into exceptional allowance rules and exceptional denial rules. An exceptional allowance rule refers to a policy that permits a specific internal/external IP or port to use a specific service. For example, a permission rule for administrators and a rule for allowing internal employees’ personal devices for work correspond to the exceptional allowance rule type. An exceptional denial rule refers to a policy that blocks specific internal and external IPs or ports to protect internal assets. For example, a rule to block IPs suspected of being harmful overseas and a rule to block NetBIOS ports registered as harmful ports in CVE correspond to the exceptional denial rule type. Although the two types of exceptional rules are normal rules, they are the factors that are misclassified as anomalies. An example of exceptional rules, including rule comments, can be found in Table 7. Many rules were not written with a rule comment, such as No. 2 in Table 7.
In this study, in order to determine whether each rule corresponds to an exceptional rule, we try to classify it by analyzing the comment written when configuring the firewall policy. The classification criteria for the exceptional rules are summarized in Table 8.

3.3. Measuring Priority of Anomaly Resolution

In this study, to measure the priority of solving anomalies, an index was developed using the causes of anomalies. Through the definition of anomalies defined in earlier studies, two factors that cause anomalies can be summarized. The first is a field, which is a basic component of firewall policy. An anomaly occurs when one or more fields among the source IP, destination IP, source port, and destination port of the two rules are included in either one. The second is a rule’s action. An anomaly occurs according to the action of the rule and determines the type of anomaly. Also, the rule that permits excessively is the factor of increasing potential risk. We want to measure the risk of an anomaly through the factors that cause the anomaly and the factors that potentially increase the risk.

3.3.1. Measuring Risk of Anomaly

In this section, we will define score metrics to measure the potential risk caused by the existence of anomalies in the firewall policy and present a method for quantitatively measuring the potential risk. The potential risk of rule refers to the cause of the anomaly. An anomaly occurs when two rules collide, so to find the potential risk due to the presence of an anomaly, you must measure the potential risk of each rule associated with the anomaly. Thus, we define anomaly risk as the sum of the potential risks of rules associated with an anomaly. The score metrics for each rule include a causal field of anomaly, whether allowed or not, and excessive access. First, the causal field of anomaly was selected as an indicator because the more fields that cause anomalies among policy fields, the more dangerous it can be. As for the measurement method, one point is given to each field that causes an anomaly among the source IP, destination IP, source port, and destination port. Next, whether allow or not was selected as an indicator matters, because it can be said to be potentially more dangerous than when the access control of the rule is “allow” compared to “deny”. As for the measurement method, 1 point is given if the access permission of the rule is “allow”, and 0 points are given if the access permission is “deny”. Lastly, excessive access was selected as an indicator because the potential risk is higher for rules that allow access to multiple IPs among the rules classified as anomalies. As for the measurement method, 1 point is given if the source IP, destination IP, source port, and destination port fields have multiple values among rules in which access is allowed or not is “allow”, and 0 points are given if they have a single value. The measurement scores of anomaly attributes are summarized in Table 9.
Definition 1.
r i , r j , r i and r j are the i t h and j t h rules. N ( R ) denotes the number of the firewall policy.
0 < i , j N ( R )
Definition 2.
S i j , The anomaly occurs when r i and r j collide. S i j is the combination of r i and r j that causes an anomaly. N ( S i j ) denotes the number of combinations of S i j .
S i j = { ( r i , r j ) | i = 1 , , n , j = 1 , , m } , ( i j ) .
Definition 3.
T k , T k is an anomaly type of S i j . The anomaly type is one of shadowing ( A n 1 ), correlation ( A n 2 ), generalization ( A n 3 ), and redundancy ( A n 4 ). N ( T k ) denotes the number of anomalies of type k. k and N(k) denote the anomaly type number and the number of types of anomaly, respectively.
T k = { A n k | k ( 1 , 2 , 3 , 4 ) } .
Definition 4.
g ( r i ) is a function that measures the anomaly risk of r i . g ( r i ) is the sum of the causal field of anomaly, whether “allow” is used or not, and excessive access.
g ( r i ) = C a u s a l f i e l d o f a n o m a l y + W h e t h e r a l l o w o r n o t + E x c e s s i v e a c c e s s
Definition 5.
R i s k o f A n o m a l y ( S i j ) is the sum of g ( r i ) and g ( r j ) .
R i s k o f A n o m a l y ( S i j ) = g ( r i ) + g ( r j ) .
Definition 6.
When measuring anomaly resolution priority based on rule number, T o t a l R i s k ( r i ) is the sum of all R i s k o f A n o m a l y ( S i j ) associated with r i .
T o t a l R i s k ( r i ) = j = 1 m R i s k o f A n o m a l y ( S i j ) .

3.3.2. Measuring the Solvability of an Anomaly

Firewall policies are systemically related to each other, and an anomaly occurs when two or more rules collide [21]. To solve the anomaly, the relationship between two or more rules must be identified and changed so as not to create a side effect. The more firewall rules there are, the more difficult it is to understand the relationship, and the difficulty of solving it varies depending on the type of anomaly. In this section, considering the complexity of the rule and the type of anomaly, we measure the possibility of solving the anomaly and set the priority among the anomalies. Rule complexity is calculated through the number of firewall rules, the number of objects, and the number of firewall interfaces defined by Wool (2010) [19]. However, in this study, since the relationship between rules is checked, it is not related to the object, and since the policy within a single firewall is detected, the interface is also irrelevant. Therefore, in this study, we check how connected one rule is with the overall firewall policy. In addition, C o m p l e x i t y ( r i ) is sought by checking how many different types of anomalies a single rule has.
C o m p l e x i t y ( r i ) = N ( k ) N ( R ) × j = 1 m N ( S i j ) .
The difficulty of solving the anomaly according to the type of anomaly is as follows. First, in the case of the redundancy anomaly ( A n 4 ) , it can be easily solved because the overlapping rules, unused rules, and processing results are the same. In the case of shadowing anomaly ( A n 1 ) and generalization anomaly ( A n 3 ) , since all the conditions in one rule are included in the other rule, we only need to check two rules and solve one of them, so the difficulty of solving can be considered normal. In the case of correlation anomaly ( A n 2 ) , since it is an inclusive relationship for each different condition, in order to solve this anomaly, it is necessary to identify the conditions corresponding to the inclusion relationship, so it is very hard to solve.
Definition 7.
D f ( T k ) , D f ( T k ) is the difficulty score of the solution according to the type k of anomaly.
D f ( T 4 ) < D f ( T 1 ) = D f ( T 3 ) < D f ( T 2 ) .
The measurement score of anomaly resolution difficulty is summarized in Table 10.
D i f f i c u l t y ( r i ) is the difficulty score D f ( T k ) in all anomaly types associated with r i multiplied by the number of that type.
D i f f i c u l t y ( r i ) = k = 1 4 D f ( T k ) × N ( T k ) .
S o l v a b i l i t y ( r i ) is a scale to measure the possibility of solving an anomaly when an anomaly occurs. As the value of both C o m p l e x i t y ( r i ) and D i f f i c u l t y ( r i ) increases, the possibility of solving the anomaly decreases, so S o l v a b i l i t y ( r i ) is a reverse of the multiplication of C o m p l e x i t y ( r i ) and D i f f i c u l t y ( r i ) .
S o l v a b i l i t y ( r i ) = 1 C o m p l e x i t y ( r i ) × D i f f i c u l t y ( r i ) .
The solvability values of r i and r j included in the same anomaly are the same.

3.3.3. Measuring Priority

In this study, in order to determine the priority of solving, the risk of the proposed anomaly and the possibility of resolving the anomaly are sorted in the order of high score and displayed to the information security managers. The ranking of the score will allow the information security managers to know which anomaly or rule has a high risk and will seek a solution to reduce the risk. However, each information security manager may have different criteria for solving the problem. There may be information security managers who want to solve the higher risk first, and there may be information security managers who want to solve the easier one first. Therefore, C o m p o s i t e I n d e x ( r i ) is defined as the sum of T o t a l R i s k ( r i ) and S o l v a b i l i t y ( r i ) multiplied by respective weights. The weights are determined according to the importance of the information security manager for the two indicators, and they are set to α and β .
C o m p o s i t e I n d e x ( r i ) = α × T o t a l R i s k ( r i ) + β × S o l v a b i l i t y ( r i ) , α + β = 1 .

4. Verification of the Model

4.1. Data for Verification

To verify the proposed model and visualization tool, we used the external firewall data of a public institution in Korea. The fields of firewall data consist of the source IP, destination IP, source port, destination port, whether to allow access, and rule comment. The total number of firewall rules was 808, and there were multiple IPs or ports in one rule. In addition, a number of rules whose field range is “any” among the source IP, destination IP, source port, and destination port have been identified. In fact, there were cases where the scope of the field was “any” due to necessity, but it was also confirmed that the scope of the rule applied to the service user was set excessively. According to NIST SP 800-41 Rev. 1, it is recommended to identify assets through risk analysis, set firewall rules appropriately, and manage them periodically [2]. In reality, risk analysis is not conducted periodically, and it is confirmed that it is difficult to manage periodically due to too many rules. In the Rule Comment, there were various types of comments such as the NetBIOS port blocking rule registered in CVE, permitting rule for receiving information from higher authorities, and permitting rule for service administrators.

4.2. Visualization Tool

We developed a visualization tool, including the proposed anomaly classification model, to help information security managers efficiently manage firewall policy. The visualization tool proceeds as shown in Figure 2.
First, information security managers use visualization tools to load their firewall policy. The loaded data fetch the following firewall policy fields: source IP, destination IP, source port, destination port, action, rule type, and rule comment. Next, the tool classifies the exceptional rule based on the rule comment and excludes it from the anomaly detection algorithm. In addition, by applying the proposed measurement index to the anomaly detection result, the score is measured, and the result is displayed to the information security managers.

4.2.1. Classifying Exceptional Rule and Detecting Anomaly

Based on the rule comment, the verification data were classified into 79 general rules, 160 exceptional allowance rules, and 569 exceptional denial rules. There were too many exceptional rules especially exceptional denial rules. After checking the results, most of the exceptional denial rules had policies to block harmful IPs and policies to block access to sites not related to work. Most of the exceptional allowance rules were permissive rules for service administrators, temporary permissive rules for vulnerability checks, or permissive rules for updates or patches.
As a result of the analysis of verification data before classifying exceptional rules based on rule comment, a total of 53,404 anomalies were detected, and for each type, 251 cases of shadowing, 51,658 cases of correlation, 221 cases of generalization, and 1274 cases of redundancy were detected. The results of anomaly detection before and after considering the exceptional rules are summarized in Table 11.
As a result of the analysis of verification data after classifying exception rules, a total of 11 anomalies were detected, and there was a reduction of 99.97% compared to before the classification of exceptional rules. As for the types of anomalies detected, 11 cases were detected only in redundancy, and no other types of anomalies were detected. Through this result, among the verification data analysis results before and after the classification of exceptional rules, the result after the classification of exceptional rules is better, and there are numerous exceptional rules in the firewall policy. Since the only type of anomaly detected is redundancy, there are not many problems that are difficult to solve in the verification data, and the firewall policy is managed relatively well.
We provide a radar chart showing the anomaly detection results before and after considering exceptional rules. However, the number of cases of correlation anomaly is extremely high, and the radar chart is not able to recognize problems. As shown in Figure 3, the visibility of the radar chart was increased by taking the logarithmic value of the anomaly detection results. In addition, by checking the anomaly detection results before and after considering the exceptional rules, information security managers can perform what-if analysis and increase work efficiency.

4.2.2. Prioritizing Anomaly and Rule

Based on the anomaly detection results, we intend to apply the priority measurement index proposed in this study. Table 12 shows the results of analyzing the priorities based on anomalies, and Table 13 shows the results of analyzing the priorities based on rule numbers.
When the measurement index proposed in this study was applied to the detected anomalies and the scores were compared to prioritize, the redundancy caused by the collision of No. 793 and No. 699 scored the highest with 15 points. And the anomaly of ( r i , r j ) and the anomaly of ( r j , r i ) were the same except for the priority 1. This was caused by a many-to-many relationship method anomaly detection algorithm, but it is necessary to produce a result value based on the rule number. Except for rules related to priority 1, rules of other priorities should have been classified as exceptional rules. Still, they were misclassified as an anomaly because they did not include the words “allow” or “deny” in the rule comment. Therefore, ( r 793 , r 699 ) was the only rule applicable to the anomaly. As such, rule comments perform an important role in classifying anomalies. There is no significant difference between the values of risk of anomaly. This is because all of the anomaly types in Table 11 have redundancy. If different types of anomaly are included, the result will be different.

5. Conclusions

In this study, we developed an advanced anomaly classification model and a visualization tool to address the challenges of effectively managing firewall policies. Our research improved existing approaches by considering exceptional rules, which are often misclassified as anomalies in existing models. By excluding these exceptional rules from the anomaly detection process, we were able to detect real anomalies more accurately. Furthermore, we defined anomaly properties and developed a quantitative index to measure and prioritize these anomalies. With our proposed model, information security managers can identify the most urgent issues within their firewall policy and address them efficiently to improve the overall level of security.
The implications of this study are as follows. First, we improved the anomaly classification model by considering the exceptional rules. The exceptional rules configured by the information security managers for operational need, but they cause normal rules to be misclassified as anomalies. In this study, based on the rule comment among the components of the firewall policy, it was classified into an exceptional allowance rule and an exceptional denial rule, and then it was excluded from the anomaly detection algorithm. In addition, through the analysis of verification data, the detection results of anomalies before and after the classification of exceptional rules were significantly reduced, and the misclassification of normal rules as anomalies was improved. This is expected to make the firewall policy analysis tool more sophisticated and more usable.
Second, it is possible to identify the priority of urgent resolution among the detected anomalies by proposing an index that can quantitatively measure anomalies through the correlation between the components of the firewall policy and the cause of the anomaly. Earlier studies have detected anomalies and reported them to information security managers, but they do not know which of the detected anomalies needs to be resolved first. In this study, by analyzing the causes of anomalies, quantitatively measuring anomalies according to indicators, and arranging them in the order of high scores, information security managers can directly prioritize solving anomalies. In addition, the proposed measurement method can be applied not only to anomalies but also to rule numbers. Thus, we can see not only anomalies but also which rules urgently need to be addressed.
Finally, the information security manager can load the firewall policy, select a rule to be excluded from the anomaly detection, detect the anomaly, check the result, and solve an anomaly through the visualized tool, so it has the advantage of being visual and intuitive. As a result, through the model of this study, information security managers can increase the reliability of anomaly detection results and improve work efficiency by effectively managing firewall policy using the measured anomalies or rule scores.
The limitations of this study are, first, that as firewall technology develops, equipment is being replaced from packet filtering-based firewalls to state-based firewalls and further, next-generation firewalls. However, since the anomaly classification algorithm in this study focuses on packet filtering-based firewall policy, additional research is needed to apply it to stateful firewalls or next-generation firewalls. Second, since the method of classifying exceptional rules is based on rule comments, rule comments must be written correctly. This is also recommended by NIST SP 800-41 Rev. 1 [2]. Finally, the measurement indexes proposed in this study are not specific. The indexes proposed to measure anomalies classify anomalies in a dichotomous way, such as yes or no. In fact, in the case of excessive access among anomaly measurement indicators, even if one IP is allowed, the IP may cause fatal damage, and even if multiple IPs are allowed, it may not be dangerous.
Future research will improve the proposed model and visualization tool to enable information security managers to efficiently manage rules regardless of work experience. First, we will present specific solutions for correcting anomalies rather than providing simple solutions. Second, we will examine the exceptional rule cases to improve the accuracy and reliability of the classification exceptional rule algorithm. Third, we want to specify the measurement standards of the indicators presented in this study so that they can be measured more realistically. Finally, a chart as shown in Figure 3 is provided so that information security managers can check before and after the modification of anomalies. Information security managers can reduce concerns about possible accidents when correcting anomalies. Also, it can provide what-if analysis by comparing AS-IS and TO-BE.
By enabling information security managers to check whether the rules are modified or deleted when resolving anomalies, it can reduce concerns about contingencies, secure the justification of firewall policy management, and increase the transparency of firewall policy management for effective firewall policy management.

Author Contributions

Conceptualization, J.P. and T.-S.K.; Methodology, J.P.; Software, B.P.; Writing—original draft, J.P.; Writing—review & editing, T.-S.K.; Visualization, B.P.; Supervision, T.-S.K.; Project administration, T.-S.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (RS-2024-00438796, Development of cloud-based cyber range establishment technology and cyber training scenario description language(K-SDL)).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are unavailable on request from the corresponding author due to data security.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Network World. 2020 State of Network; Network World: Framingham, MA, USA, 2020. [Google Scholar]
  2. NIST. SP 800-41 Rev.1: Guidelines on Firewalls and Firewall Policy; NIST: Gaithersburg, MD, USA, 2009. [Google Scholar]
  3. Boan News. A Survey on the Recognition and Selection Criteria of Firewall Policy Management Solutions. Available online: https://www.boannews.com/media/view.asp?idx=111134&kind=0=0 (accessed on 15 November 2022).
  4. Kim, T.; Kwon, T.; Lee, J.; Song, J. F/Wvis: Hierarchical visual approach for effective optimization of firewall policy. IEEE Access 2021, 9, 105989–106004. [Google Scholar] [CrossRef]
  5. NIST. SP 800-215: Guide to a Secure Enterprise Network Landscape; NIST: Gaithersburg, MD, USA, 2022. [Google Scholar]
  6. Garcia-Alfaro, J.; Cuppens, F.; Cuppens-Boulahia, N.; Martinez, S.; Cabot, J. Management of stateful firewall misconfiguration. Comput. Secur. 2013, 39, 64–85. [Google Scholar] [CrossRef]
  7. SECUI, Bluemax NGF Brochure. Available online: https://www.secui.com/network/bluemaxngf (accessed on 11 July 2022).
  8. AhnLab, TrusGuard Brochure. Available online: https://www.ahnlab.com/kr/site/product/productView.do?prodSeq=10 (accessed on 11 July 2022).
  9. WINS, Features of NGFW. Available online: https://www.wins21.com/eng/product/product.html (accessed on 11 July 2022).
  10. Gartner Research. 2021 Gartner Magic Quadrant for Network Firewalls; Gartner Research: Stamford, CT, USA, 2021. [Google Scholar]
  11. PaloAlto Networks, Firewall Features Overview DataSheet. Available online: https://www.paloaltonetworks.com/resources/datasheets/firewall-feature-overview-datasheet (accessed on 11 July 2022).
  12. Fortinet, Next-Generation Firewall. Available online: https://www.fortinet.com/kr/products/next-generation-firewall (accessed on 11 July 2022).
  13. Check Point Software Technologies, Next Generation Firewalls. Available online: https://www.checkpoint.com/quantum/next-generation-firewall (accessed on 11 July 2022).
  14. Al-Shaer, E.; Hamed, H. Modeling and management of firewall policies. IEEE Trans. Netw. Serv. Manag. 2004, 1, 2–10. [Google Scholar] [CrossRef]
  15. Voronkov, A.; Martucci, L.A.; Lindskog, S. Measuring the usability of firewall rule sets. IEEE Access 2020, 8, 27106–27121. [Google Scholar] [CrossRef]
  16. Al-Haj, S.; Al-Shaer, E. Measuring firewall security. In Proceedings of the 2011 4th Symposium on Configuration Analytics and Automation, Arlington, VA, USA, 31 October–1 November 2011; pp. 1–4. [Google Scholar]
  17. Chomsiri, T.; He, X.; Nanda, P.; Tan, Z. Hybrid tree-rule firewall for high speed data transmission. IEEE Trans. Cloud Comput. 2020, 8, 1237–1249. [Google Scholar] [CrossRef]
  18. Hu, H.; Ahn, G.J.; Kulkarni, K. Detecting and resolving firewall policy anomalies. IEEE Trans. Dependable Secur. Comput. 2012, 9, 318–331. [Google Scholar] [CrossRef]
  19. Yoon, M.; Chen, S.; Zhang, Z. Minimizing the maximum firewall rule set in a network with multiple firewalls. IEEE Trans. Comput. 2010, 59, 218–230. [Google Scholar] [CrossRef]
  20. Wool, A. Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese. IEEE Internet Comput. 2010, 14, 58–65. [Google Scholar] [CrossRef]
  21. Togay, C.; Kasif, A.; Catal, C.; Tekinerdogan, B. A firewall policy anomaly detection framework for reliable network security. IEEE Trans. Reliab. 2022, 71, 339–347. [Google Scholar] [CrossRef]
  22. Liu, A.X. Firewall policy change-impact analysis. Acm Trans. Internet Technol. 2008, 11, 1–24. [Google Scholar]
Figure 1. Anomaly classification model.
Figure 1. Anomaly classification model.
Applsci 15 02979 g001
Figure 2. Process of visualization tool.
Figure 2. Process of visualization tool.
Applsci 15 02979 g002
Figure 3. Validation data before and after considering the exceptional rules.
Figure 3. Validation data before and after considering the exceptional rules.
Applsci 15 02979 g003
Table 1. Research on firewall policy management.
Table 1. Research on firewall policy management.
MethodologyTheme
Classification of
Anomaly
Usability of
Firewall Policy
Easing Complexity
of Policy
Improving Process
Performance
DelphiHu et al. (2012) [18]
Kim et al. (2021) [4]
Togay et al. (2022) [21]
Voronkov et al.
(2020) [15]
Development of
automated tool
Hu et al. (2012) [18]
Kim et al. (2021) [4]
Togay et al. (2022) [21]
Chomsiri et al.
(2020) [17]
VisualizationHu et al. (2012) [18]
Kim et al. (2021) [4]
Togay et al. (2022) [21]
Improvement of
alogrithm
Al-Shaer and Hamed
(2004) [14]
Voronkov et al.
(2020) [15]
Yoon et al. (2010) [19]
Garcia-Alfaro et al.
(2013) [6]
Wool (2010) [20]
Chomsiri et al.
(2020) [17]
Table 2. Example of shadowing anomaly.
Table 2. Example of shadowing anomaly.
NoSource IPDestination IPSource PortDestination PortAction
1192.168.0 *20.198.162 *80443Deny
2192.168.0.3020.198.162.7680443Allow
Note: * ranges from 1 to 255.
Table 3. Example of correlation anomaly.
Table 3. Example of correlation anomaly.
NoSource IPDestination IPSource PortDestination PortAction
1192.168.0 *20.198.162.7680443Deny
2192.168.0.3020.198.162 *80443Allow
Note: * ranges from 1 to 255.
Table 4. Example of generalization anomaly.
Table 4. Example of generalization anomaly.
NoSource IPDestination IPSource PortDestination PortAction
1192.168.0 *20.198.162 *80443Allow
2AnyAny80443Deny
Note: * ranges from 1 to 255.
Table 5. Example of redundancy anomaly.
Table 5. Example of redundancy anomaly.
NoSource IPDestination IPSource PortDestination PortAction
1192.168.0 *20.198.162 *80443Allow
2192.168.0 *20.198.162.7680443Allow
Note: * ranges from 1 to 255.
Table 6. Example of irrelevance anomaly.
Table 6. Example of irrelevance anomaly.
NoSource IPDestination IPSource PortDestination PortActionCounter
110.10.10.610.10.10.180443Allow0
Table 7. Example of exceptional rules including rule comments.
Table 7. Example of exceptional rules including rule comments.
NoSource IPDestination IPSource PortDestination PortActionRule Comment
1192.168.0 *20.198.162 *80443AllowAllow for Users
2192.168.0.3220.198.162 *anyanyAllow
3192.168.0.220.198.162 *anyanyAllowAllow for Firewall Manager
410.20.10.1AnyanyanyDenyDeny harmful IPs
5AnyAny80135, 445DenyDeny NetBIOS port
Note: * ranges from 1 to 255.
Table 8. Classification criteria for exceptional rules.
Table 8. Classification criteria for exceptional rules.
Classification CriteriaExceptional Allowance RuleExceptional Denial Rule
Word“Allow”“Deny”
Table 9. Measurement score of anomaly attributes.
Table 9. Measurement score of anomaly attributes.
Elements of AnomalySubjectAttributeScore
Causal field of anomalySource IPNon-causal field0
Causal field1
Destination IPNon-causal field0
Causal field1
Source portNon-causal field0
Causal field1
Destination portNon-causal field0
Causal field1
Whether allow or notA rule actionDeny0
Allow1
Excessive accessA field in a rule whose action is allowSingle0
Multiple1
Table 10. Measurement score of anomaly resolution difficulty.
Table 10. Measurement score of anomaly resolution difficulty.
Type of AnomalyNotationDifficultyScore
Correlation D f ( T 2 ) Hard3
Shadowing D f ( T 1 ) Normal2
Generalization D f ( T 3 ) Normal2
Redundancy D f ( T 4 ) Easy1
Table 11. Anomaly detection before and after considering the exceptional rules.
Table 11. Anomaly detection before and after considering the exceptional rules.
ItemShadowingCorrelationGeneralizationRedundancyTotal
Before25151,658221127453,404
After0001111
Table 12. Results of analyzing the priorities based on anomaly.
Table 12. Results of analyzing the priorities based on anomaly.
PriorityRule iRule jCausal FactorType of AnomalyRisk of Anomaly ( S ij )
1793699dst_ip, dst_portRedundancy15
2694695src_ipRedundancy14
3694695src_ipRedundancy14
4694695src_ipRedundancy14
5694695src_ipRedundancy14
6694695src_ip, dst_portRedundancy10
7694695src_ip, dst_portRedundancy10
8694695dst_ip, dst_portRedundancy10
9694695dst_ip, dst_portRedundancy10
10602597dst_ip, dst_portRedundancy10
Table 13. Results of analyzing the priorities based on rule number.
Table 13. Results of analyzing the priorities based on rule number.
PriorityRule #Type of AnomalyTotal Risk ( r i )Solvability ( r i )Composite Index ( r i )
An 1 An 2 An 3 An 4
17930001(15)15808411.5
26940001(14)14808411
36950001(14)14808411
47040001(14)14808411
57050001(14)14808411
65940001(10)10808409
75960001(10)10808409
85970001(10)10808409
95980001(10)10808409
106020001(10)10808409
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Park, J.; Park, B.; Kim, T.-S. Development of an Anomaly Classification Model and a Decision Support Tool for Firewall Policy Configuration. Appl. Sci. 2025, 15, 2979. https://doi.org/10.3390/app15062979

AMA Style

Park J, Park B, Kim T-S. Development of an Anomaly Classification Model and a Decision Support Tool for Firewall Policy Configuration. Applied Sciences. 2025; 15(6):2979. https://doi.org/10.3390/app15062979

Chicago/Turabian Style

Park, Jinyong, Byeongjo Park, and Tae-Sung Kim. 2025. "Development of an Anomaly Classification Model and a Decision Support Tool for Firewall Policy Configuration" Applied Sciences 15, no. 6: 2979. https://doi.org/10.3390/app15062979

APA Style

Park, J., Park, B., & Kim, T.-S. (2025). Development of an Anomaly Classification Model and a Decision Support Tool for Firewall Policy Configuration. Applied Sciences, 15(6), 2979. https://doi.org/10.3390/app15062979

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop