Integration of Security Service Functions Into Network-Level Access Control

被引:0
|
作者
Bradatsch, Leonard [1 ]
Kargl, Frank [1 ]
机构
[1] Ulm Univ, Inst Distributed Syst, D-89077 Ulm, Germany
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Security; IP networks; Access control; Authentication; Logic; Performance evaluation; Multiprotocol label switching; Inspection; Zero Trust; Process control; Network security; traffic steering; service function chaining; access control; zero trust;
D O I
10.1109/ACCESS.2024.3522575
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Service function chaining is an approach to dynamically steer traffic through different service functions like intrusion prevention systems within a local area network. Existing approaches to determining the set of service functions through which specific traffic is steered are relatively coarse-grained. In this article, which focuses on security-related service functions, we present a more fine-grained determination process by integrating security service functions into attribute-based access control and utilizing contextual information attributes, such as access time. By mapping attributes to security service functions, we aim to achieve four key objectives: 1) Minimizing false negative access decisions, 2) minimizing false positive access decisions, 3) enhancing network performance by optimizing the application of security service functions, and 4) ensuring network visibility. The paper includes a detailed list of available security service functions and the security actions each can perform based on a comprehensive literature review. It also explains how attributes can be mapped to security service functions to determine when and which security service function needs to be applied to network traffic. The paper also includes detailed use cases to demonstrate the practical implementation of our approach. In the evaluation of these use cases we achieved an accuracy improvement of up to 16% compared to a standard Zero Trust approach that does not integrate traffic classification into access control. Additionally, we reduced false negatives by as much as 93% and false positives by up to 100%. The network performance was enhanced by decreasing service access times by up to 29% and increasing the number of accesses per second by up to 40% during high concurrency.
引用
收藏
页码:197783 / 197815
页数:33
相关论文
共 50 条
  • [1] Network-level Access Control Management for the Cloud
    Beaty, Kirk
    Kundu, Ashish
    Naik, Vijay
    Acharya, Arup
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2013), 2013, : 98 - 107
  • [2] Network-Level Access Control Policy Analysis and Transformation
    Basile, Cataldo
    Cappadonia, Alberto
    Lioy, Antonio
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (04) : 985 - 998
  • [3] Network Functions Virtualization Access Control as a Service
    Smine, Manel
    Espes, David
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIV, DBSEC 2020, 2020, 12122 : 100 - 117
  • [4] Network-Level Security and Privacy Control for Smart-Home IoT Devices
    Sivaraman, Vijay
    Gharakheili, Hassan Habibi
    Vishwanath, Arun
    Boreli, Roksana
    Mehani, Olivier
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 163 - 167
  • [5] Simplifying CORBA security service to support service level access control
    Kumar, A
    Jalote, P
    Gupta, D
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2003: OTM 2003 WORKSHOPS, 2003, 2889 : 793 - 806
  • [6] History based distributed filtering - A tagging approach to network-level access control
    Sailer, R
    Kabatnik, M
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 373 - 382
  • [7] Network-Level Security for the Internet of Things: Opportunities and Challenges
    Gharakheili, Hassan Habibi
    Sivanathan, Arunan
    Hamza, Ayyoob
    Sivaraman, Vijay
    COMPUTER, 2019, 52 (08) : 58 - 62
  • [8] Single sign-on and access control for network security service
    Kim, T
    Roh, JH
    Choi, D
    Cho, Y
    Jin, S
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 357 - 360
  • [9] Zero Trust Score-based Network-level Access Control in Enterprise Networks
    Bradatsch, Leonard
    Miroshkin, Oleksandr
    Trkulja, Natasa
    Kargl, Frank
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1422 - 1429
  • [10] Twofold control loop network-level congestion control
    Calvagna, Andrea
    Tropea, Giuseppe
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2007, 18 (01): : 81 - 95