US 12,381,849 B2
Polymorphic dynamic firewall
Satishkumar Sadagopan, Leawood, KS (US); Mudhakar Srivatsa, White Plains, NY (US); Dinesh C. Verma, New Castle, NY (US); Mathews Thomas, Flower Mound, TX (US); Utpal Mangla, Toronto (CA); and Gerald Coon, Durham, NC (US)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by INTERNATIONAL BUSINESS MACHINES CORPORATION, Armonk, NY (US)
Filed on Oct. 28, 2022, as Appl. No. 18/050,516.
Prior Publication US 2024/0146693 A1, May 2, 2024
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/0263 (2013.01) [H04L 63/1425 (2013.01); H04L 63/1433 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for constructing a dynamically adaptive network firewall, comprising:
identifying a plurality of nodes and resources connected to one another in a network having a network firewall, through which a data traffic flows;
creating a logical entity of firewall resources and services with a surface area;
establishing a firewall model for providing traffic flow using said logical entity having one or more Internet Protocol addresses or domain name systems and preventing unauthorized access to resources, wherein said firewall model directs said data traffic flow by establishing reference pointers to a set of external rules and rules lists;
using said firewall model, to instantiating resources as needed according to resource capability for handing one or more task completion and/or for providing network security for said network firewall, wherein said firewall grows or contracts according to characteristics of data traffic flow and includes one or more resources provided geographically through one or more cloud providers;
implementing said firewall network using said firewall model using said instantiated resources and dynamically using said model upon receiving data traffic, to expands or contracts said network by said firewall model by adding or removing resources according to work relating to handling said one or more task completion and work related to providing network security so unauthorized access to said network is prevented;
continuously monitoring said network using said firewall model so that unauthorized access to said network is prevented and determining any vulnerabilities to said firewall through said monitoring to modify said firewall and said network as needed.