17643009. INFERRING CLOUD NETWORK CONNECTIVITY AS A MINIMAL LIST OF FIREWALL RULES simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

INFERRING CLOUD NETWORK CONNECTIVITY AS A MINIMAL LIST OF FIREWALL RULES

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

ADI Sosnovich of Haifa (IL)

Ziv Nevo of Yokneam IIit (IL)

Gil Eliezer Shurek of Haifa (IL)

SHAI Doron of Kibuz Meggido (IL)

Karen Frida Yorav of Haifa (IL)

INFERRING CLOUD NETWORK CONNECTIVITY AS A MINIMAL LIST OF FIREWALL RULES - A simplified explanation of the abstract

This abstract first appeared for US patent application 17643009 titled 'INFERRING CLOUD NETWORK CONNECTIVITY AS A MINIMAL LIST OF FIREWALL RULES

Simplified Explanation

The abstract describes a method, computer system, and computer program for determining cluster connectivity. The method involves receiving a connectivity graph as input and generating a minimal list of firewall rules by merging rules with common connectivity attributes.

  • The invention provides a method for determining cluster connectivity.
  • It involves receiving a connectivity graph as input.
  • The method generates a minimal list of firewall rules.
  • The firewall rules are generated by iteratively merging rules with common connectivity attributes.

Potential Applications

This technology has potential applications in various fields, including:

  • Network security: The method can be used to determine firewall rules for securing network clusters.
  • Cloud computing: It can be applied to ensure secure connectivity between different components in a cloud environment.
  • Data centers: The technology can help in managing and securing connectivity within data center clusters.

Problems Solved

The technology addresses the following problems:

  • Complex connectivity: It simplifies the process of determining firewall rules by merging rules with common connectivity attributes.
  • Rule optimization: It generates a minimal list of firewall rules, reducing complexity and improving efficiency.
  • Connectivity management: The method helps in managing and securing connectivity within clusters, ensuring proper communication and preventing unauthorized access.

Benefits

The benefits of this technology include:

  • Simplified rule generation: The method simplifies the process of determining firewall rules by merging rules with common connectivity attributes.
  • Improved efficiency: By generating a minimal list of firewall rules, the technology reduces complexity and improves the efficiency of connectivity management.
  • Enhanced security: The method helps in securing network clusters by ensuring proper communication and preventing unauthorized access.


Original Abstract Submitted

A method, computer system, and a computer program product for determining a cluster connectivity is provided. The present invention may first include receiving as input a connectivity graph. The present invention may then include generating a minimal list of firewall rules from the received connectivity graph by iteratively merging firewall rules with commonality of connectivity attribute.