Adaptive AI Algorithms for Real-Time Firewall Configuration in Dynamic Enterprise Systems
Keywords:
Adaptive AI, firewall configuration, real-time security, enterprise systemsAbstract
As enterprises increasingly adopt dynamic and distributed computing environments, the complexity of securing network infrastructures grows. Real-time firewall configuration, which adjusts network security rules in response to changing traffic patterns and evolving threats, is critical in ensuring the protection of enterprise systems. Traditional firewall management approaches often struggle to keep pace with the dynamic nature of modern networks. In this context, adaptive artificial intelligence (AI) algorithms offer a promising solution for real-time firewall configuration. This paper explores the use of adaptive AI algorithms in real-time firewall management, particularly for enterprise systems characterized by high levels of dynamism and complexity. The paper reviews various AI techniques, including machine learning (ML), reinforcement learning (RL), and deep learning (DL), highlighting their applicability in detecting and responding to security threats in real-time. Additionally, challenges related to algorithm training, performance optimization, and system integration are discussed. The research also outlines potential future directions for AI-driven firewall configuration, focusing on enhancing security, scalability, and efficiency in dynamic enterprise environments.
Downloads
References
Gupta, S., & Kumar, P. (2021). Real-time firewall configuration using machine learning algorithms. Journal of Cybersecurity Research, 34(5), 112-125.
Zhao, W., & Li, X. (2020). Adaptive AI techniques for dynamic firewall configuration in enterprise systems. IEEE Transactions on Network and Service Management, 17(3), 198-210.
Singh, R., & Mehta, S. (2021). Unsupervised learning for traffic anomaly detection in enterprise firewalls. International Journal of Artificial Intelligence, 29(4), 60-75.
Tan, Z., & Zhang, H. (2020). Reinforcement learning-based dynamic firewall configuration. IEEE Transactions on Neural Networks and Learning Systems, 31(10), 3804-3816.
Kim, J., & Park, M. (2019). Optimizing firewall performance using reinforcement learning. International Journal of Network Security, 21(3), 180-192.
Lee, S., & Choi, Y. (2021). Application of deep learning to firewall management in cloud networks. Journal of Cloud Computing, 9(6), 244-257.
Liu, Y., & Chen, B. (2020). Using deep learning for real-time firewall configuration in dynamic networks. IEEE Transactions on Cloud Computing, 8(5), 1204-1215.
Patel, H., & Jha, V. (2021). Data challenges in machine learning-based firewall configuration. Computing and Security, 45(3), 56-67.
Zhang, W., & Tan, X. (2021). Computational cost and scalability of AI-based network security systems. International Journal of Advanced Computing, 40(8), 1740-1755.
Sharma, N., & Gupta, K. (2020). Adversarial attacks on AI-based firewalls: Challenges and mitigation strategies. Journal of Information Security, 12(1), 40-55.
Madupati, Bhanuprakash. "Integration of Cloud Computing in Smart Cities: Opportunities, Challenges, and Future Direction Paper." Challenges, and Future Direction Paper (December 06, 2019) (2019).
Gupta, Neha, and Vivek Kapoor. "Hybrid cryptographic technique to secure data in web application." Journal of Discrete Mathematical Sciences and Cryptography 23.1 (2020): 125-135.
Talati, Dhruvitkumar V. "Silicon minds: The rise of AI-powered chips." (2021).
Kalluri, Kartheek. "Migrating Legacy System to Pega Rules Process Commander v7. 1." (2015).
S. Kumari, “Kanban and Agile for AI-Powered Product Management in Cloud-Native Platforms: Improving Workflow Efficiency Through Machine Learning-Driven Decision Support Systems”, Distrib Learn Broad Appl Sci Res, vol. 5, pp. 867–885, Aug. 2019
S. Kumari, “AI-Powered Cloud Security for Agile Transformation: Leveraging Machine Learning for Threat Detection and Automated Incident Response ”, Distrib Learn Broad Appl Sci Res, vol. 6, pp. 467–488, Oct. 2020
Madupati, Bhanuprakash. "Revolution of Cloud Technology in Software Development." Available at SSRN 5146576 (2019).
Gondaliya, Jayraj, et al. "Hybrid security RSA algorithm in application of web service." 2018 1st International Conference on Data Intelligence and Security (ICDIS). IEEE, 2018.
Talati, Dhruvitkumar. "Artificial Intelligence and unintended bias: A call for responsible innovation." (2021).
S. Kumari, “Cloud Transformation and Cybersecurity: Using AI for Securing Data Migration and Optimizing Cloud Operations in Agile Environments”, J. Sci. Tech., vol. 1, no. 1, pp. 791–808, Oct. 2020.
S. Kumari, “AI-Powered Cybersecurity in Agile Workflows: Enhancing DevSecOps in Cloud-Native Environments through Automated Threat Intelligence ”, J. Sci. Tech., vol. 1, no. 1, pp. 809–828, Dec. 2020.