Sign In to Follow Application
View All Documents & Correspondence

Method And System For Generating Dynamic Rules For Computer Network Firewall

Abstract: Method and system for generating dynamic rules for a computer network firewall are provided. The method includes applying a plurality of drop rules to a plurality of packets that are received at a network interface. The plurality of drop rules are sequentially arranged rules and determine at least one of allowance and dropping of a packet based on corresponding tracking information. Then a unique drop rule is generated for dropping a set of packets based on an implicit deny rule. The implicit deny rule determines a drop for the plurality of packets. Thereafter, sequence for the unique drop rule in the plurality of drop rules is determined based on dropping of the plurality of packets. Accordingly, the unique drop rule is deployed in the sequence of drop rules. Fig. 2

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
15 February 2018
Publication Number
34/2019
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
bangalore@knspartners.com
Parent Application
Patent Number
Legal Status
Grant Date
2023-07-17
Renewal Date

Applicants

WIPRO LIMITED
Doddakannelli, Sarjapur Road, Bangalore 560035, Karnataka, India.

Inventors

1. MAULIK YAGNIK
#307, V.S. Cozy apartment, 28th A Main, 6th Phase J.P. Nagar, Bangalore. 560078, Karnataka, India.

Specification

Claims:WE CLAIM
1. A method for generating dynamic rules for a firewall policy, the method comprising:
applying, by a computing device, a plurality of drop rules to a plurality of packets received at a network interface, wherein the plurality of drop rules are sequentially arranged and determine at least one of allowance and dropping of a packet of the plurality of packets based on a tracking information;
generating, by the computing device, a unique drop rule for dropping a set of packets from the plurality of packets based on an implicit deny rule, wherein the implicit deny rule determines a drop for each of the plurality of packets; and
determining, by the computing device, a sequence for the unique drop rule in the plurality of drop rules based on dropping of the set of packets.

2. The method of claim 1, wherein the network interface is an ingress interface at a communication network.

3. The method of claim 1, wherein the tracking information includes source or destination IP addresses of the plurality of packets.

4. The method of claim 1, wherein the tracking information includes source or destination port of the plurality of packets.

5. The method of claim 1, wherein the implicit deny rule comprises dropping of the plurality of packets based on implicitly denied tracking information.

6. The method of claim 1, wherein the plurality of drop rules are sequentially arranged based on a priority position of each drop rule from the plurality of drop rules.

7. The method of claim 1, wherein determining the sequence for the unique drop rule comprises:
analyzing the set of packets in response to the dropping;
determining a hit count of the set of packets; and
positioning the unique drop rule based on a higher hit count value amongst the plurality of drop rules.

8. The method of claim 1 further comprises:
determining a buffer value to hold the set of packets based on positioning of the unique drop rule;
configuring a timeout period for installation of the unique drop rule amongst the plurality of drop rules; and
deploying the unique drop rule based on the buffer value and the timeout period.

9. A system for generating dynamic rules for a firewall policy, the system comprising:
a network interface;
a processor coupled to the network interface;
a memory communicatively coupled to the processor and having processor instructions stored thereon, causing the processor, on execution to:
apply a plurality of drop rules to a plurality of packets received at a network interface, wherein the plurality of drop rules are sequentially arranged and determine at least one of allowance and dropping of a packet of the plurality of packets based on a tracking information;
generate a unique drop rule for dropping a set of packets from the plurality of packets based on an implicit deny rule, wherein the implicit deny rule determines an drop for each of the plurality of packets; and
determine a sequence for the unique drop rule in the plurality of drop rules based on dropping of the set of packets.

10. The system of claim 9, wherein the network interface is an ingress interface at a communication network.

11. The system of claim 9, wherein the tracking information includes source or destination IP addresses of the plurality of packets.

12. The system of claim 9, wherein the tracking information includes source or destination port of the plurality of packets.

13. The system of claim 9, wherein the implicit deny rule comprises dropping of the plurality of packets based on implicitly denied tracking information.

14. The system of claim 9, wherein the plurality of drop rules are sequentially arranged based on a priority position of each drop rule from the plurality of drop rules.

15. The system of claim 9, wherein to determining the sequence for the unique drop rule, the processor instruction are further configured to:
analyze the set of packets in response to the dropping;
determine a hit count of the set of packets; and
position the unique drop rule based on a higher hit count value amongst the plurality of drop rules.

16. The system of claim 9, wherein the processor instructions further cause the processor to:
determine a buffer value to hold the set of packets based on positioning of the unique drop rule;
configure a timeout period for installation of the unique drop rule amongst the plurality of drop rules; and
deploy the unique drop rule based on the buffer value and the timeout period.

Dated this 15th day of February, 2018

Swetha SN
IN/PA-2123
Of K&S Partners
Agent for the Applicant
, Description:TECHNICAL FIELD
This disclosure relates generally to network firewall and more particularly to method and system for generating dynamic rules for computer network firewall.

Documents

Application Documents

# Name Date
1 201841005761-IntimationOfGrant17-07-2023.pdf 2023-07-17
1 201841005761-STATEMENT OF UNDERTAKING (FORM 3) [15-02-2018(online)].pdf 2018-02-15
2 201841005761-PatentCertificate17-07-2023.pdf 2023-07-17
2 201841005761-REQUEST FOR EXAMINATION (FORM-18) [15-02-2018(online)].pdf 2018-02-15
3 201841005761-POWER OF AUTHORITY [15-02-2018(online)].pdf 2018-02-15
3 201841005761-FORM 3 [16-05-2023(online)].pdf 2023-05-16
4 201841005761-Written submissions and relevant documents [16-05-2023(online)].pdf 2023-05-16
4 201841005761-FORM 18 [15-02-2018(online)].pdf 2018-02-15
5 201841005761-FORM 1 [15-02-2018(online)].pdf 2018-02-15
5 201841005761-AMENDED DOCUMENTS [10-04-2023(online)].pdf 2023-04-10
6 201841005761-DRAWINGS [15-02-2018(online)].pdf 2018-02-15
6 201841005761-Correspondence to notify the Controller [10-04-2023(online)].pdf 2023-04-10
7 201841005761-FORM 13 [10-04-2023(online)].pdf 2023-04-10
7 201841005761-DECLARATION OF INVENTORSHIP (FORM 5) [15-02-2018(online)].pdf 2018-02-15
8 201841005761-POA [10-04-2023(online)].pdf 2023-04-10
8 201841005761-COMPLETE SPECIFICATION [15-02-2018(online)].pdf 2018-02-15
9 201841005761-REQUEST FOR CERTIFIED COPY [05-03-2018(online)].pdf 2018-03-05
9 201841005761-US(14)-HearingNotice-(HearingDate-02-05-2023).pdf 2023-03-30
10 201841005761-FER.pdf 2021-10-17
10 201841005761-Proof of Right (MANDATORY) [25-04-2018(online)].pdf 2018-04-25
11 201841005761-FER_SER_REPLY [28-07-2021(online)].pdf 2021-07-28
11 Correspondence by Agent_Form30,Form1_01-05-2018.pdf 2018-05-01
12 201841005761-Information under section 8(2) [27-07-2021(online)].pdf 2021-07-27
12 201841005761-PETITION UNDER RULE 137 [28-07-2021(online)].pdf 2021-07-28
13 201841005761-FORM 3 [27-07-2021(online)].pdf 2021-07-27
14 201841005761-Information under section 8(2) [27-07-2021(online)].pdf 2021-07-27
14 201841005761-PETITION UNDER RULE 137 [28-07-2021(online)].pdf 2021-07-28
15 201841005761-FER_SER_REPLY [28-07-2021(online)].pdf 2021-07-28
15 Correspondence by Agent_Form30,Form1_01-05-2018.pdf 2018-05-01
16 201841005761-FER.pdf 2021-10-17
16 201841005761-Proof of Right (MANDATORY) [25-04-2018(online)].pdf 2018-04-25
17 201841005761-US(14)-HearingNotice-(HearingDate-02-05-2023).pdf 2023-03-30
17 201841005761-REQUEST FOR CERTIFIED COPY [05-03-2018(online)].pdf 2018-03-05
18 201841005761-COMPLETE SPECIFICATION [15-02-2018(online)].pdf 2018-02-15
18 201841005761-POA [10-04-2023(online)].pdf 2023-04-10
19 201841005761-FORM 13 [10-04-2023(online)].pdf 2023-04-10
19 201841005761-DECLARATION OF INVENTORSHIP (FORM 5) [15-02-2018(online)].pdf 2018-02-15
20 201841005761-DRAWINGS [15-02-2018(online)].pdf 2018-02-15
20 201841005761-Correspondence to notify the Controller [10-04-2023(online)].pdf 2023-04-10
21 201841005761-FORM 1 [15-02-2018(online)].pdf 2018-02-15
21 201841005761-AMENDED DOCUMENTS [10-04-2023(online)].pdf 2023-04-10
22 201841005761-Written submissions and relevant documents [16-05-2023(online)].pdf 2023-05-16
22 201841005761-FORM 18 [15-02-2018(online)].pdf 2018-02-15
23 201841005761-POWER OF AUTHORITY [15-02-2018(online)].pdf 2018-02-15
23 201841005761-FORM 3 [16-05-2023(online)].pdf 2023-05-16
24 201841005761-REQUEST FOR EXAMINATION (FORM-18) [15-02-2018(online)].pdf 2018-02-15
24 201841005761-PatentCertificate17-07-2023.pdf 2023-07-17
25 201841005761-IntimationOfGrant17-07-2023.pdf 2023-07-17
25 201841005761-STATEMENT OF UNDERTAKING (FORM 3) [15-02-2018(online)].pdf 2018-02-15

Search Strategy

1 searchE_23-12-2020.pdf

ERegister / Renewals

3rd: 16 Oct 2023

From 15/02/2020 - To 15/02/2021

4th: 16 Oct 2023

From 15/02/2021 - To 15/02/2022

5th: 16 Oct 2023

From 15/02/2022 - To 15/02/2023

6th: 16 Oct 2023

From 15/02/2023 - To 15/02/2024

7th: 31 Jan 2024

From 15/02/2024 - To 15/02/2025

8th: 15 Feb 2025

From 15/02/2025 - To 15/02/2026