Firewall Rule Optimization in Dynamic Multi-Tenant Environments

Authors

  • Ana Silva Postdoctoral Researcher, University of Campinas, Campinas, Brazil Author

Keywords:

Reinforcement learning, firewall optimization, multi-tenant environments, cybersecurity

Abstract

Rule of firewall administration and optimization become very much difficult because of cloud computing and multi-tenant architectures. Rule based method does not succeed in cloud system because of variable resources, network channels, and traffic patterns. Now for multi-tenant security and efficiency firewall rule uses reinforcement learning that lets network update firewall rule in real time and balancing security and performance. This paper aims to address RL mechanisms firewall management integration and empirical evidence of its usefulness.

Downloads

Download data is not yet available.

References

Zhang, L., & Wang, R. (2020). Reinforcement learning in network security applications. Journal of Network Security, 28(4), 123-139.

S. Kumari, “Kanban and AI for Efficient Digital Transformation: Optimizing Process Automation, Task Management, and Cross-Departmental Collaboration in Agile Enterprises”, Blockchain Tech. & Distributed Sys., vol. 1, no. 1, pp. 39–56, Mar. 2021

Sivaraman, Hariprasad. (2020). Integrating Large Language Models for Automated Test Case Generation in Complex Systems.

Singu, Santosh Kumar. "Real-Time Data Integration: Tools, Techniques, and Best Practices." ESP Journal of Engineering & Technology Advancements 1.1 (2021): 158-172.

S. Kumari, “Kanban-Driven Digital Transformation for Cloud-Based Platforms: Leveraging AI to Optimize Resource Allocation, Task Prioritization, and Workflow Automation”, J. of Artificial Int. Research and App., vol. 1, no. 1, pp. 568–586, Jan. 2021

S. Kumari, “Kanban and Agile for AI-Powered Product Management in Cloud-Native Platforms: Improving Workflow Efficiency Through Machine Learning-Driven Decision Support Systems”, Distrib Learn Broad Appl Sci Res, vol. 5, pp. 867–885, Aug. 2019

Singu, Santosh Kumar. "Impact of Data Warehousing on Business Intelligence and Analytics." ESP Journal of Engineering & Technology Advancements 2.2 (2022): 101-113.

Pillai, Vinayak. “Implementing Efficient Data Operations: An Innovative Approach”. Asian Journal of Multidisciplinary Research & Review, vol. 3, no. 6, Dec. 2022, pp. 231-67, https://ajmrr.org/journal/article/view/241.

S. Kumari, “Digital Transformation Frameworks for Legacy Enterprises: Integrating AI and Cloud Computing to Revolutionize Business Models and Operational Efficiency ”, Journal of AI-Assisted Scientific Discovery, vol. 1, no. 1, pp. 186–204, Jan. 2021

Sivaraman, Hariprasad. (2020). Intelligent Deployment Orchestration Using ML for Multi-Environment CI/CD Pipelines.

S. Kumari, “AI-Powered Cybersecurity in Agile Workflows: Enhancing DevSecOps in Cloud-Native Environments through Automated Threat Intelligence ”, J. Sci. Tech., vol. 1, no. 1, pp. 809–828, Dec. 2020.

S. Kumari, “Cloud Transformation and Cybersecurity: Using AI for Securing Data Migration and Optimizing Cloud Operations in Agile Environments”, J. Sci. Tech., vol. 1, no. 1, pp. 791–808, Oct. 2020.

Singu, Santosh Kumar. "Designing scalable data engineering pipelines using Azure and Databricks." ESP Journal of Engineering & Technology Advancements 1.2 (2021): 176-187.

Sivaraman, Hariprasad. (2021). INTELLIGENT AUTOMATION FOR SERVICE DEGRADATION PREDICTION USING LLMS AND OBSERVABILITY DATA. International Journal of Engineering Management. 6. 10.5281/zenodo.14342920.

S. Kumari, “AI-Powered Cloud Security for Agile Transformation: Leveraging Machine Learning for Threat Detection and Automated Incident Response ”, Distrib Learn Broad Appl Sci Res, vol. 6, pp. 467–488, Oct. 2020

Singu, Santosh Kumar. "ETL Process Automation: Tools and Techniques." ESP Journal of Engineering & Technology Advancements 2.1 (2022): 74-85.

Patel, S., & Chen, Y. (2019). Adaptive firewall management using reinforcement learning. Cybersecurity Innovations, 17(3), 200-215.

Clark, A., & Wilson, D. (2021). Traffic analysis with reinforcement learning for dynamic networks. AI in Cyber Defense, 12(6), 67-80.

Kumar, V., & Singh, P. (2020). Scaling reinforcement learning for large-scale rule management. Journal of Machine Learning in Security, 15(2), 145-158.

Lopez, M., & White, J. (2019). Fairness in multi-tenant network environments. Network Security Journal, 24(5), 34-50.

Johnson, K., & Patel, M. (2021). Case study: Implementing RL-driven firewalls in cloud infrastructures. Cloud Security Review, 18(7), 200-214.

Turner, B., & Adams, R. (2020). Automation of rule updates in enterprise networks. TechNet Security Reports, 11(4), 110-125.

Lee, C., & Brown, S. (2021). Proactive DDoS mitigation through reinforcement learning. Journal of Applied Network Defense, 10(3), 98-112.

Harris, T., & Gonzalez, A. (2020). Making reinforcement learning interpretable for cybersecurity. AI Explainability Journal, 19(8), 56-70.

Miller, J., & Clark, R. (2021). Addressing computational overhead in real-time RL applications. Journal of Computational Security, 15(5), 85-101.

Adams, L., & Patel, S. (2019). Data privacy challenges in training RL models for network security. Data Protection Review, 22(1), 45-58.

Walker, R., & Thompson, J. (2020). Hybrid models for enhanced firewall rule optimization. Machine Learning in Security Studies, 14(6), 25-39.

Downloads

Published

19-01-2022

How to Cite

[1]
Ana Silva, “Firewall Rule Optimization in Dynamic Multi-Tenant Environments”, American J Data Sci Artif Intell Innov, vol. 2, pp. 7–11, Jan. 2022, Accessed: Mar. 07, 2026. [Online]. Available: https://ajdsai.org/index.php/publication/article/view/4