Defining of cloud service priority for dynamic creating WAF rules
Abstract
The article examines the process of determining the prioritization of cloud services and their coverage by network firewalls. The structure and key parameters of previously collected hybrid cloud configurations are analyzed. Particular attention is given to the specifics of cloud service deployment within hybrid clouds and their coverage by web application firewalls. Frequently, such firewalls are included among the standard ser vices offered by providers such as Cloudflare, allowing comprehensive protection of the entire hybrid cloud environment. The article also discusses different types of access to cloud services, which may provide either direct access or employ reverse proxying. In the latter case, secure connections are terminated, and both static and dy namic firewall rules are applied. This study focuses on descriptive data collected from previous research on hybrid clouds, particularly concerning cloud services and their interconnections. Within the context of this study, priority patterns are intended to be used for the dynamic generation of firewall rules. These priority patterns are necessary for dynamically creating either permissive or restrictive rules. This approach is espe cially relevant for automating firewall configuration using generative artificial intelligence tools. The article proposes two indicators for the development of firewall rule priority patterns: the availability priority and the firewall coverage priority. The availability priority determines the level of criticality in ensuring uninter rupted access to a specific cloud service, whereas the firewall coverage priority defines the degree of access restriction to that service. An expert survey was conducted as part of this research to evaluate the availabil ity and protection parameters of all cloud services collected in previous studies. The article proposes using these two metrics for creating priority patterns for the web application firewall.
Problems in programming 2025; 4: 32-40
Keywords
Full Text:
PDF (Українська)References
Prasetyo, S.E., Haeruddin, H. & Ariesryo, K., 2024. Website Security System from Denial of Service attacks, SQL Injection, Cross Site Scripting using Web Application Firewall. Antivirus: Jurnal Ilmiah Teknik Informatika, 18(1), pp. 27–36.
Malinich, I.P. & Ivanchuk, Y.V., 2025. Features of microservice deployment in learning management systems in hybrid clouds. Systemni Tekhnolohii, 3(158), pp. 157–170.
Malinich, I.P. & Ivanchuk, Y.V., 2025. Indicators for assessing network availability and connectivity of information systems in cloud computing. In: Information Systems and Technologies: Results and Prospects: Proceedings of the 2nd International Scientific and Practical Conference, 5 March 2025, Kyiv, Ukraine. Kyiv: FIT KNUTSH, pp. 248–251.
Beigi-Mohammadi, N., Shtern, M. & Litoiu, M., 2020. Adaptive load management of web applications on software infrastructure. IEEE Transactions on Network and Service Management, 17(1), pp. 488–502.
Maliarchuk, I.I. & Smolynets, M.A., 2025. Hybrid cloud solutions as a way to balance control and flexibility in the activities of modern IT enterprises.Aktualni Pytannia Ekonomichnykh Nauk, 10.
Kovalenko, A., Lyashenko, O. & Yaroshevych, R., 2021. Comparative analysis of cloud infrastructure organization. Advanced Information Systems, 5(2), pp. 108-113.
Refbacks
- There are currently no refbacks.








