Next Generation AI-Based Firewalls: a Comparative Study

Authors

  • Sina Ahmadi Independent Researcher

Keywords:

artificial intelligence, firewall, security, cloud, cybersecurity

Abstract

Cybersecurity is a critical concern in the digital age, demanding innovative approaches to safeguard sensitive information and systems. This paper conducts a thorough examination of next-generation firewalls (NGFWs) that integrate artificial intelligence (AI) technologies, presenting a comparative analysis of their efficacy. As traditional firewalls fall short in addressing modern cyber threats, the incorporation of AI provides a promising avenue for enhanced threat detection and mitigation. The literature review explores existing research on AI-based firewalls, delving into methodologies and technologies proposed by leading experts in the field. A compilation of 20-25 references from reputable sources, including ijcseonline.org, forms the basis for this comparative study. The selected references provide insights into various AI-based firewall architectures, algorithms, and performance metrics, laying the groundwork for a comprehensive analysis. The methodology section outlines the systematic approach employed to compare different AI-based firewall methods. Leveraging machine learning and deep learning approaches, the study assesses key performance metrics such as detection accuracy, false positive rates, and computational efficiency. The goal is to provide a nuanced understanding of the strengths and weaknesses inherent in each approach, facilitating an informed evaluation. The comparative analysis section employs graphical representations to elucidate the findings, offering a visual overview of the performance disparities among selected AI-based firewall methods. Pros and cons are meticulously examined, providing stakeholders with valuable insights for decision-making in cybersecurity strategy. This research aims to contribute to the ongoing discourse on AI-based firewalls, addressing current limitations and paving the way for advancements that fortify the cybersecurity landscape.

References

Z. Ai, M. Zhang, W. Zhang, J. Kang, L. Tong, and Y. Duan, "Survey on the scheme evaluation, opportunities and challenges of software defined?information centric network," IET Communications, 2023.

M. Alazab, S. KP, S. Srinivasan, S. Venkatraman, and V. Q. Pham, "Deep learning for cyber security applications: A comprehensive survey," 2021.

S. Ali, S. U. Rehman, A. Imran, G. Adeem, Z. Iqbal, and K. I. Kim, "Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection," Electronics, vol. 11, no. 23, pp. 3934, 2022.

S. Armoogum and N. Mohamudally, "A Comprehensive Review of Intrusion Detection and Prevention Systems against Single Flood Attacks in SIP-Based Systems," International Journal of Computer Network & Information Security, vol. 13, no. 6, 2021.

O. G. Awuor, "Assessment of existing cyber-attack detection models for web-based systems," Global Journal of Engineering and Technology Advances, vol. 15, no. 01, pp. 070-089, 2023.

R. Badhwar, "The Case for AI Artificial intelligence (AI)/ML Machine learning (ML) in Cybersecurity," in The CISO’s Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Cham: Springer International Publishing, 2021, pp. 45-73.

M. Bagaa, T. Taleb, J. B. Bernabe, and A. Skarmeta, "A machine learning security framework for IoT systems," IEEE Access, vol. 8, pp. 114066-114077, 2020.

M. Dayal, A. Chawla, M. Khari, and A. N. Mahajan, "Artificial Intelligence-Based Smart Packet Filter," in Proceedings of Third International Conference on Computing, Communications, and Cyber-Security: IC4S 2021, Singapore: Springer Nature Singapore, July 2022, pp. 791-801.

H. R. Deekshetha and A. K. Tyagi, "Automated and intelligent systems for next-generation-based smart applications," in Data Science for Genomics, Academic Press, 2023, pp. 265-276.

P. Dolezel, F. Holik, J. Merta, and D. Stursa, "Optimization of a depiction procedure for an artificial intelligence-based network protection system using a genetic algorithm," Applied Sciences, vol. 11, no. 5, p. 2012, 2021.

H. Dong, A. Munir, H. Tout, and Y. Ganjali, "Next-generation data center network enabled by machine learning: Review, challenges, and opportunities," IEEE Access, vol. 9, pp. 136459-136475, 2021.

M. Emu, "Artificial intelligence empowered virtual network function deployment and service function chaining for next-generation networks" (Doctoral dissertation).

S. B. Far, A. I. Rad, S. M. H. Bamakan, and M. R. Asaar, "Toward Metaverse of everything: Opportunities, challenges, and future directions of the next generation of visual/virtual communications," Journal of Network and Computer Applications, p. 103675, 2023.

B. Frederick, "Artificial Intelligence in Computer Networks: Role of AI in Network Security" (Master's thesis).

S. S. Gill, M. Xu, C. Ottaviani, P. Patros, R. Bahsoon, A. Shaghaghi, et al., "AI for next generation computing: Emerging trends and future directions," Internet of Things, vol. 19, p. 100514, 2022.

G. González-Granadillo, S. González-Zarzosa, and R. Diaz, "Security information and event management (SIEM): analysis, trends, and usage in critical infrastructures," Sensors, vol. 21, no. 14, p. 4759, 2021.

A. Haldorai, Q. S. Mahdi, and P. Devasudha, "Application of AI/ML in Network-Slicing-Based Infrastructure of the Next-Generation Wireless Networking Systems," in 2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1-10, IEEE, February 2023.

S. Iftikhar, S. S. Gill, C. Song, M. Xu, M. S. Aslanpour, A. N. Toosi, et al., "AI-based fog and edge computing: A systematic review, taxonomy and future directions," Internet of Things, p. 100674, 2022.

A. Imanbayev, S. Tynymbayev, R. Odarchenko, S. Gnatyuk, R. Berdibayev, A. Baikenov, and N. Kaniyeva, "Research of machine learning algorithms for the development of intrusion detection systems in 5G mobile networks and beyond," Sensors, vol. 22, no. 24, p. 9957, 2022.

P. L. S. Jayalaxmi, R. Saha, G. Kumar, M. Conti, and T. H. Kim, "Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey," IEEE Access, 2022.

D. Kant and A. Johannsen, "Evaluation of AI-based use cases for enhancing the cyber security defense of small and medium-sized companies (SMEs)," J. Electron. Imaging, vol. 34, paper MOBMU-387, 2022.

I. U. K. U. Khan, M. Ouaissa, M. Ouaissa, Z. Abou El Houda, and M. F. Ijaz (Eds.), "Cyber Security for Next-Generation Computing Technologies," CRC Press, 2023.

M. Macas, C. Wu, and W. Fuertes, "A survey on deep learning for cybersecurity: Progress, challenges, and opportunities," Computer Networks, vol. 212, p. 109032, 2022.

S. Mishra, "Exploring the Impact of AI-Based Cyber Security Financial Sector Management," Applied Sciences, vol. 13, no. 10, p. 5875, 2023.

E. R. Ndukwe and B. Baridam, "A Graphical and Qualitative Review of Literature on AI-based Cyber-Threat Intelligence (CTI) in Banking Sector," European Journal of Engineering and Technology Research, vol. 8, no. 5, pp. 59-69, 2023.

P. Ramya, S. V. Babu, and G. Venkatesan, "Advancing Cybersecurity with Explainable Artificial Intelligence: A Review of the Latest Research," in 2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA), pp. 1351-1357, IEEE, August 2023.

V. Ravi, M. Alazab, K. P. Soman, S. Srinivasan, S. Venkatraman, Q. V. Pham, and K. Simran, "Deep Learning for Cyber Security Applications: A Comprehensive Survey."

P. Salva-Garcia, R. Ricart-Sanchez, E. Chirivella-Perez, Q. Wang, and J. M. Alcaraz-Calero, "XDP-based SmartNIC Hardware Performance Acceleration for Next-Generation Networks," Journal of Network and Systems Management, vol. 30, no. 4, p. 75, 2022.

I. H. Sarker, "Multi?aspects AI?based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview," Security and Privacy, e295, 2023.

I. H. Sarker, M. H. Furhad, and R. Nowrozy, "AI-driven cybersecurity: an overview, security intelligence modeling and research directions," SN Computer Science, vol. 2, pp. 1-18, 2021.

X. Shen, J. Gao, W. Wu, K. Lyu, M. Li, W. Zhuang, et al., "AI-assisted network-slicing based next-generation wireless networks," IEEE Open Journal of Vehicular Technology, vol. 1, pp. 45-66, 2020.

T. Sowmya and E. M. Anita, "A comprehensive review of AI-based intrusion detection system," Measurement: Sensors, p. 100827, 2023.

S. Suprabhath Koduru, V. S. P. Machina, and S. Madichetty, "Cyber Attacks in Cyber-Physical Microgrid Systems: A Comprehensive Review," Energies, vol. 16, no. 12, p. 4573, 2023.

E. Tcydenova, T. W. Kim, C. Lee, and J. H. Park, "Detection of adversarial attacks in AI-based intrusion detection systems using explainable AI," Human-Centric Comput Inform Sci, vol. 11, 2021.

S. S. Tirumala, N. Nepal, and S. K. Ray, "Raspberry pi-based intelligent cyber defense systems for SMEs and smart-homes: An exploratory study," EAI Endorsed Transactions on Smart Cities, vol. 6, no. 18, pp. e4-e4, 2022.

A. A. Wagan, A. A. Khan, Y. L. Chen, P. L. Yee, J. Yang, and A. A. Laghari, "Artificial Intelligence-Enabled Game-Based Learning and Quality of Experience: A Novel and Secure Framework (B-AIQoE)," Sustainability, vol. 15, no. 6, p. 5362, 2023.

T. Zebin, S. Rezvy, and Y. Luo, "An explainable AI-based intrusion detection system for DNS over HTTPS (DoH) attacks," IEEE Transactions on Information Forensics and Security, vol. 17, pp. 2339-2349, 2022.

T. Zhang, H. Qiu, M. Mellia, Y. Li, H. Li, and K. Xu, "Interpreting AI for networking: Where we are and where we are going," IEEE Communications Magazine, vol. 60, no. 2, pp. 25-31, 2022.

S. Patil, V. Varadarajan, D. Walimbe, S. Gulechha, S. Shenoy, A. Raina, and K. Kotecha, "Improving the Robustness of AI-Based Malware Detection Using Adversarial Machine Learning," Algorithms, vol. 14, no. 10, p. 297, 2021.

Downloads

Published

2023-12-31

How to Cite

Sina Ahmadi. (2023). Next Generation AI-Based Firewalls: a Comparative Study. International Journal of Computer (IJC), 49(1), 245–262. Retrieved from https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2168

Issue

Section

Articles