DYNAMIC PACKET FILTERING USING MACHINE LEARNING METHODS
DOI:
https://doi.org/10.37547/ajast/Volume04Issue10-11Keywords:
Cyber-attacks, Neural Networks, IP packetsAbstract
With the emergence of the Internet, cyber-attacks and threats have become significant issues. Traditional manual network monitoring and rule-based packet filtering methods have become labor-intensive and less effective in combating attacks. Filtering packets based solely on payload and pattern matching is also inefficient. There is a need for a dynamic model capable of learning packet filtering rules. This article proposes a packet filtering model using Neural Networks. After developing the model classified with training and validation data, it can be utilized to support dynamic packet filtering. The proposed model allows filtering packets not only based on static rules but also considering IP packet attributes and rules learned by the model in advance. The model takes into account payloads and other IP packet attributes for filtering. It can automatically update firewall rules to enhance security.
References
Gulomov Sh.R. Types of malicious traffic in the network and their detection. Multidisciplinary Scientific Journal. December, Issue 24 | 2023, pp. 424-432.
SN Tashev, AG Ganiev The Role of “Imagination” in the Process of “Creative Thinking” Developing Students' “Imagination” and “Creative Thinking” Skills in Teaching Physics. Annals of the Romanian Society for Cell Biology, 2021/3/6, pp. 633-642.
SN Tashev THE ROLE OF “IMAGINATION” IN THE PROCESS OF “CREATIVE THINKING”, DEVELOPING STUDENTS’ “IMAGINATION” AND “CREATIVE THINKING” SKILLS IN TEACHING PHYSICS PSYCHOLOGY AND EDUCATION, pp. 3569-3575.
Y.B. Karamatovich, T.S. Norboboevich, N.I. Ibrohimovich. Verification of the pocket filtering based on method of verification on the model. 2019 International Conference on Information Science and Communications Technologies (ICISCT).
J. Ning et al., “Pine: Enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment,” in Proc. Eur. Symp. Res. Comput. Secur., 2020, pp. 3–22.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Sarvar Norboboyevich Tashev

This work is licensed under a Creative Commons Attribution 4.0 International License.