AUTOMATING FIREWALL POLICY MANAGEMENT USING AI AND MICROSERVICES FOR ENHANCED NETWORK SECURITY

Authors

  • Sairaj Kommera JP Morgan Chase, USA. Author

DOI:

https://doi.org/10.34218/IJCET_16_01_149

Keywords:

Firewall Policy Automation, AI-driven Network Security, Microservices Architecture, Real-time Threat Intelligence, Adaptive Cybersecurity

Abstract

This article presents an innovative approach to automating firewall policy management through the integration of artificial intelligence (AI) and microservices architecture. The proposed article framework addresses critical challenges in traditional firewall management, including rule redundancy, configuration inconsistencies, and human error. By leveraging natural language processing for policy review and machine learning for anomaly detection, the system enhances the accuracy and efficiency of policy implementation. The microservices architecture provides a scalable and flexible foundation, allowing for real-time threat intelligence integration and automated policy updates. Case studies demonstrate significant improvements in policy optimization, threat response times, and operational efficiency in large enterprise environments. The article also explores best practices for deployment, focusing on scalability, regulatory compliance, and risk mitigation strategies. Finally, it examines future directions and emerging trends, highlighting the potential for broader applications in cybersecurity. This comprehensive article approach offers a promising solution for organizations seeking to enhance their network security posture in the face of increasingly complex and dynamic threat landscapes.

References

Steve Morgan, Editor-in-Chief, Sausalito, Calif. – Nov. 13, 2020, Cybersecurity Ventures. (2020). “Cybercrime To Cost The World $10.5 Trillion Annually By 2025”. [Online] Available: https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/

Palo Alto Networks. (2023). What Is a Firewall? [Online] Available: https://www.paloaltonetworks.com/cyberpedia/what-is-a-firewall

Newman, S. (2021). Building Microservices: Designing Fine-Grained Systems. O'Reilly Media. Released August 2021, [Online] Available: https://www.oreilly.com/library/view/building-microservices-2nd/9781492034018/

Chandola, V., Banerjee, A., & Kumar, V. (2009). “Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1-58. [Online] Available: https://dl.acm.org/doi/10.1145/1541880.1541882

Buczak, A. L., & Guven, E. (26 October 2015). “A survey of data mining and machine learning methods for cyber security intrusion detection”. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176. [Online] Available: https://ieeexplore.ieee.org/document/7307098

Gartner Research. (25 June 2024). “Summary Translation: Market Guide for Network Detection and Response”[Online] Available: https://www.gartner.com/en/documents/5531495

IBM. (2023). “Cost of a Data Breach Report”. [Online] Available: https://www.ibm.com/reports/data-breach

Gracias, Abram & Klinton, Brown. (2024). “How organizations manage cybersecurity risks, ai implementation risks, and data privacy in digital transformation”. Financial Management. [Online] Available: https://www.researchgate.net/publication/385619018_HOW_ORGANIZATIONS_MANAGE_CYBERSECURITY_RISKS_AI_IMPLEMENTATION_RISKS_AND_DATA_PRIVACY_IN_DIGITAL_TRANSFORMATION

Slapničar, S., Vuko, T., Čular, M., & Drašček, M. (2022). Effectiveness of cybersecurity audit. International Journal of Accounting Information Systems, 44, 100548. [Online] Available: https://doi.org/10.1016/j.accinf.2021.100548

Gartner. (Ava McCartney, October 16, 2023). “Top Strategic Technology Trends for 2024”. [Online] Available: https://www.gartner.com/en/articles/gartner-top-10-strategic-technology-trends-for-2024

Downloads

Published

2025-02-07

How to Cite

Sairaj Kommera. (2025). AUTOMATING FIREWALL POLICY MANAGEMENT USING AI AND MICROSERVICES FOR ENHANCED NETWORK SECURITY. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY, 16(01), 2067-2086. https://doi.org/10.34218/IJCET_16_01_149