Designing Rule Base for Genetic Feedback Algorithm Based Network Security Policy Framework Using State Machine

A genetic algorithm based policy management system judges the validity of network events according to the rules defined in the rule base. These rules are either IP addresses or combination of IP address and some other parameters, such as port numbers etc. This paper discusses the design and benefits of rule base which is based on Finite State Machines. Since whenever a new network event comes, the process of judging the event should be less time consuming. This could be done by making the rule base efficient in terms of searching of rules. One of the way of doing so is using FSM’s. For a table having 2^32 (approx) entries, the searching time for a FSM based system is calculated mathematically to be 2^10 (approx), and the time complexity for same number of entries for a linear searching system will be 2^32 (approx) . In this paper a brief overview of Finite State Machines is presented. The proposed design of Rule Base is discussed in detail with its advantages.

[1]  Jeffrey O. Kephart,et al.  An artificial intelligence perspective on autonomic computing policies , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..

[2]  Roch Guérin,et al.  A Framework for Policy-based Admission Control , 2000, RFC.

[3]  Alessandra Russo,et al.  A goal-based approach to policy refinement , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..

[4]  Thomas Kwok,et al.  A policy-based management system with automatic policy selection and creation capabilities by using a singular value decomposition technique , 2006, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06).

[5]  Chen Xiao-su,et al.  Genetic-Feedback Algorithm Based Network Security Policy Framework , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[6]  Andrew W. Moore,et al.  Reinforcement Learning: A Survey , 1996, J. Artif. Intell. Res..