System and method for behavior-based firewall modeling
First Claim
Patent Images
1. A method for controlling data flow through a firewall comprising:
- establishing a firewall model for the firewall, wherein the firewall model defines nodes, connections between the nodes, and a set of firewall rules applicable to the nodes, the connections between the nodes, or a combination thereof, wherein each of the nodes represents simultaneously a source and a destination for data packets, and wherein the set of firewall rules comprise a tree graph with an arriving sub-tree having one or more rule chains for conditioning the data packets without accepting or dropping the data packets, a matrix sub-tree having one or more rule chains for accepting or dropping in the data packets without changing the data packets, and an extensible sub-tree having one or more rule chains for providing dynamic extensibility to the firewall rules;
implementing the firewall within one or more machines connected to network segments where the nodes reside;
receiving a packet at an arriving node, wherein the arriving node is one of the nodes defined by the firewall model;
conditioning the packet based on rules in the one or more rule chains in the arriving sub-tree that are associated with the arriving node; and
accepting or dropping the packet based on rules in the one or more rule chains in the matrix sub-tree that are associated with the arriving node, an inter-node connection, or a combination thereof, wherein the inter-node connection is one of the connections defined by the firewall model.
8 Assignments
0 Petitions
Accused Products
Abstract
One embodiment of the present invention creates a model of the traffic through a network firewall and uses that model to dynamically manipulate the network firewall based on human intervention or based on the automatic invocations of processes and protocols that implement firewall policy. Another embodiment of the invention creates a model of the physical and virtual network interfaces that a firewall system controls and presents abstracted entities representing both the interface abstractions and the processing nodes (network segments or network client devices) to and through which network traffic flows.
265 Citations
20 Claims
-
1. A method for controlling data flow through a firewall comprising:
-
establishing a firewall model for the firewall, wherein the firewall model defines nodes, connections between the nodes, and a set of firewall rules applicable to the nodes, the connections between the nodes, or a combination thereof, wherein each of the nodes represents simultaneously a source and a destination for data packets, and wherein the set of firewall rules comprise a tree graph with an arriving sub-tree having one or more rule chains for conditioning the data packets without accepting or dropping the data packets, a matrix sub-tree having one or more rule chains for accepting or dropping in the data packets without changing the data packets, and an extensible sub-tree having one or more rule chains for providing dynamic extensibility to the firewall rules; implementing the firewall within one or more machines connected to network segments where the nodes reside; receiving a packet at an arriving node, wherein the arriving node is one of the nodes defined by the firewall model; conditioning the packet based on rules in the one or more rule chains in the arriving sub-tree that are associated with the arriving node; and accepting or dropping the packet based on rules in the one or more rule chains in the matrix sub-tree that are associated with the arriving node, an inter-node connection, or a combination thereof, wherein the inter-node connection is one of the connections defined by the firewall model. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product comprising a computer readable storage medium storing computer executable instructions for:
-
establishing a firewall model for a firewall, wherein the firewall model defines nodes, connections between the nodes, and a set of firewall rules applicable to the nodes, the connections between the nodes, or a combination thereof, wherein each of the nodes represents simultaneously a source and a destination for data packets, and wherein the set of firewall rules comprise a tree graph with an arriving sub-tree having one or more rule chains for conditioning the data packets without accepting or dropping the data packets, a matrix sub-tree having one or more rule chains for accepting or dropping the data packets without changing the data packets, and an extensible sub-tree having one or more rule chains for providing dynamic extensibility to the firewall rules; and implementing the firewall within one or more machines connected to network segments where the nodes reside, wherein when a packet arrives at one of the nodes, the packet is conditioned based on rules in the one or more rule chains in the arriving sub-tree that are associated with the node, and wherein the packet is accepted or dropped based on rules in the one or more rule chains in the matrix sub-tree that are associated with the node, the inter-node connection, or a combination thereof wherein the inter-node connection is one of the connections defined by the firewall model. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A system for controlling data flow through a firewall, comprising:
-
at least one processor; and a computer readable storage medium accessible by the at least one processor and storing computer instructions executable by the at least one processor for; establishing a firewall model for a firewall, wherein the firewall model defines nodes, connections between the nodes, and a set of firewall rules applicable to the nodes, the connections between the nodes, or a combination thereof, wherein each of the nodes represents simultaneously a source and a destination for data packets, and wherein the set of firewall rules comprise a tree graph with an arriving sub-tree having one or more rule chains for conditioning the data packets without accepting or dropping the data packets, a matrix sub-tree having one or more rule chains for accepting or dropping the data packets without changing the data packets, and an extensible sub-tree having one or more rule chains for providing dynamic extensibility to the firewall rules; and implementing the firewall within one or more machines connected to network segments where the nodes reside, wherein when a packet arrives at one of the nodes, the packet is conditioned based on rules in the one or more rule chains in the arriving sub-tree that are associated with the node, and wherein the packet is accepted or dropped based on rules in the one or more rule chains in the matrix sub-tree that are associated with the node, the inter-node connection, or a combination thereof, wherein the inter-node connection is one of the connections defined by the firewall model. - View Dependent Claims (17, 18, 19, 20)
-
Specification