System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy
First Claim
1. One or more non-transitory computer readable media comprising code for execution, wherein the code is executable by one or more processors to:
- detect, by a first node in a network protected from unauthorized external access, a threat that is received at the first node from a source node in the network, the network including at least a plurality of nodes having respective security modules, and wherein the threat is at least one of a violation of a network policy or a violation of a system policy;
create, at the first node, a first firewall policy to block incoming network requests associated with a source address of the source node and outgoing network requests to the source address of the source node, in response to the first node detecting the threat;
block incoming network requests received at the first node from the source node by applying the first firewall policy at the first node;
broadcast an alert from the first node to the respective security modules of the plurality of nodes in the network, wherein the broadcast alert comprises the first firewall policy to be applied by the plurality of nodes;
determine, by the first node, whether the source node includes a firewall module; and
communicate, from the first node to the source node, based at least in part on the determination that the source node includes the firewall module, a second firewall policy to be applied by the source node to block outgoing network requests from the source node to the plurality of nodes in the network and to block network requests received at the source node from other nodes.
9 Assignments
0 Petitions
Accused Products
Abstract
A method for containing a threat in network environment using dynamic firewall policies is provided. In one example embodiment, the method can include detecting a threat originating from a first node having a source address in a network, applying a local firewall policy to block connections with the source address, and broadcasting an alert to a second node in the network. In more particular embodiments, an alert may be sent to a network administrator identifying the source address and providing remedial information. In yet other particular embodiments, the method may also include applying a remote firewall policy to the first node blocking outgoing connections from the first node.
-
Citations
10 Claims
-
1. One or more non-transitory computer readable media comprising code for execution, wherein the code is executable by one or more processors to:
-
detect, by a first node in a network protected from unauthorized external access, a threat that is received at the first node from a source node in the network, the network including at least a plurality of nodes having respective security modules, and wherein the threat is at least one of a violation of a network policy or a violation of a system policy; create, at the first node, a first firewall policy to block incoming network requests associated with a source address of the source node and outgoing network requests to the source address of the source node, in response to the first node detecting the threat; block incoming network requests received at the first node from the source node by applying the first firewall policy at the first node; broadcast an alert from the first node to the respective security modules of the plurality of nodes in the network, wherein the broadcast alert comprises the first firewall policy to be applied by the plurality of nodes; determine, by the first node, whether the source node includes a firewall module; and
communicate, from the first node to the source node, based at least in part on the determination that the source node includes the firewall module, a second firewall policy to be applied by the source node to block outgoing network requests from the source node to the plurality of nodes in the network and to block network requests received at the source node from other nodes. - View Dependent Claims (2, 3, 4)
-
-
5. A first node in a network protected from unauthorized external access, the first node comprising:
-
a hardware processor; and a memory storing executable instructions that when executed by the processor cause the hardware processor to; detect a threat that is received from a source node in the network, the network including at least a plurality of nodes having respective security modules, and wherein the threat is at least one of a violation of a network policy or a violation of a system policy; create a first firewall policy to block incoming network requests associated with a source address of the source node and outgoing network requests to the source address of the source node, in response to the first node detecting the threat; block incoming network requests received at the first node from the source node by applying the first firewall policy at the first node; and broadcast an alert to the respective security modules of the plurality of nodes in the network, wherein the broadcast alert comprises the first firewall policy to be applied by the plurality of nodes; determine, by the first node, whether the source node includes a firewall module; and communicate, from the first node to the source node, based at least in part on the determination that the source node includes the firewall module, a second firewall policy to the source node to be applied by the source node to block outgoing network requests from the source node to the plurality of nodes in the network and to block network requests received at the source node from other nodes. - View Dependent Claims (6)
-
-
7. A method, comprising:
-
detecting, by a first node in a network protected from unauthorized external access, a threat that is received from a source node in the network, the network including at least a plurality of nodes having respective security modules, and wherein the threat is at least one of a violation of a network policy or a violation of a system policy; creating, at the first node, a first firewall policy to block incoming network requests associated with a source address of the source node and outgoing network requests to the source address of the source node, in response to the first node detecting the threat; blocking incoming network requests received at the first node from the source node by applying the first firewall policy at the first node; broadcasting an alert from the first node to the respective security modules of the plurality of nodes in the network, wherein the broadcast alert comprises the first firewall policy to be applied by the plurality of nodes; determining, by the first node, whether the source node includes a firewall module; and
communicating, from the first node to the source node, based at least in part on the determination that the source node includes the firewall module, a second firewall policy to be applied by the source node to block outgoing network requests from the source node to the plurality of nodes in the network and to block network requests received at the source node from other nodes. - View Dependent Claims (8)
-
-
9. One or more non-transitory computer readable media comprising code for execution, wherein the code is executable by one or more processors to:
-
create, at a first node in a network, a first firewall policy to block incoming network requests associated with a source address of a source node in the network, wherein the network is protected from unauthorized external access, in response to the first node detecting a threat that is received at the first node from the source node, and wherein the threat is at least one of a violation of a network policy or a violation of a system policy; block incoming network requests received at the first node from the source node and outgoing network requests to the source address of the source node by applying the first firewall policy at the first node; broadcast an alert from the first node to respective security modules of a plurality of nodes in the network, the broadcast based, at least in part, on the threat received at the first node from the source node being detected by the first node, wherein the broadcast alert comprises the first firewall policy to be applied by the plurality of nodes to block incoming network requests associated with a source address of the source node, wherein the first node is a target of the received threat; determine, by the first node, whether the source node includes a firewall module; and
communicate, from the first node to the source node, based at least in part on the determination that the source node includes the firewall module, a second firewall policy to be applied by the source node to block outgoing network requests from the source node to the plurality of nodes in the network and to block network requests received at the source node from other nodes. - View Dependent Claims (10)
-
Specification