Integration of Security Service Functions Into Network-Level Access Control

被引:0
|
作者
Bradatsch, Leonard [1 ]
Kargl, Frank [1 ]
机构
[1] Ulm Univ, Inst Distributed Syst, D-89077 Ulm, Germany
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Security; IP networks; Access control; Authentication; Logic; Performance evaluation; Multiprotocol label switching; Inspection; Zero Trust; Process control; Network security; traffic steering; service function chaining; access control; zero trust;
D O I
10.1109/ACCESS.2024.3522575
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Service function chaining is an approach to dynamically steer traffic through different service functions like intrusion prevention systems within a local area network. Existing approaches to determining the set of service functions through which specific traffic is steered are relatively coarse-grained. In this article, which focuses on security-related service functions, we present a more fine-grained determination process by integrating security service functions into attribute-based access control and utilizing contextual information attributes, such as access time. By mapping attributes to security service functions, we aim to achieve four key objectives: 1) Minimizing false negative access decisions, 2) minimizing false positive access decisions, 3) enhancing network performance by optimizing the application of security service functions, and 4) ensuring network visibility. The paper includes a detailed list of available security service functions and the security actions each can perform based on a comprehensive literature review. It also explains how attributes can be mapped to security service functions to determine when and which security service function needs to be applied to network traffic. The paper also includes detailed use cases to demonstrate the practical implementation of our approach. In the evaluation of these use cases we achieved an accuracy improvement of up to 16% compared to a standard Zero Trust approach that does not integrate traffic classification into access control. Additionally, we reduced false negatives by as much as 93% and false positives by up to 100%. The network performance was enhanced by decreasing service access times by up to 29% and increasing the number of accesses per second by up to 40% during high concurrency.
引用
收藏
页码:197783 / 197815
页数:33
相关论文
共 50 条
  • [21] Network Integration on the Control Level
    Kwiecien, Blazej
    Stoj, Jacek
    COMPUTER NETWORKS, 2011, 160 : 322 - 327
  • [22] Network-Level Hierarchical Bottleneck Congestion Control Method for a Mixed Traffic Network
    Zeng, Yuncheng
    Shao, Minhua
    Sun, Lijun
    SUSTAINABILITY, 2023, 15 (23)
  • [23] A Service Access Security Control Model in Cyberspace
    Li Qianmu
    Yin Jie
    Hou Jun
    Xu Jian
    Zhang Hong
    Qi Yong
    INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT I, 2011, 134 (0I): : 434 - +
  • [24] Local Network-Level Integration Mediates Effects of Transcranial Alternating Current Stimulation
    Fusca, Marco
    Ruhnau, Philipp
    Neuling, Toralf
    Weisz, Nathan
    BRAIN CONNECTIVITY, 2018, 8 (04) : 212 - 219
  • [25] Network-level control of heterogeneous automated traffic guaranteeing bus priority
    Chen, Xiangdong
    Lin, Xi
    Li, Meng
    He, Fang
    TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2022, 140
  • [26] A Queue-based Random Access Scheme in Network-level Cooperative Wireless Networks
    Dimitriou, Ioannis
    Pappas, Nikolaos
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [27] Interaction paths promote module integration and network-level robustness of spliceosome to cascading effects
    Paulo R. Guimarães
    Mathias M. Pires
    Maurício Cantor
    Patricia P. Coltri
    Scientific Reports, 8
  • [28] Interaction paths promote module integration and network-level robustness of spliceosome to cascading effects
    Guimaraes, Paulo R., Jr.
    Pires, Mathias M.
    Cantor, Mauricio
    Coltri, Patricia P.
    SCIENTIFIC REPORTS, 2018, 8
  • [29] Equity and network-level maintenance scheduling
    Boyles, Stephen D.
    EURO JOURNAL ON TRANSPORTATION AND LOGISTICS, 2015, 4 (01) : 175 - 193
  • [30] Security analysis of network access control implementations
    Cetin, F.
    Dagonnier, T.
    Oechslin, P.
    RELIABILITY, RISK AND SAFETY: THEORY AND APPLICATIONS VOLS 1-3, 2010, : 1907 - 1914