Integration of Security Service Functions Into Network-Level Access Control

被引:0
|
作者
Bradatsch, Leonard [1 ]
Kargl, Frank [1 ]
机构
[1] Ulm Univ, Inst Distributed Syst, D-89077 Ulm, Germany
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Security; IP networks; Access control; Authentication; Logic; Performance evaluation; Multiprotocol label switching; Inspection; Zero Trust; Process control; Network security; traffic steering; service function chaining; access control; zero trust;
D O I
10.1109/ACCESS.2024.3522575
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Service function chaining is an approach to dynamically steer traffic through different service functions like intrusion prevention systems within a local area network. Existing approaches to determining the set of service functions through which specific traffic is steered are relatively coarse-grained. In this article, which focuses on security-related service functions, we present a more fine-grained determination process by integrating security service functions into attribute-based access control and utilizing contextual information attributes, such as access time. By mapping attributes to security service functions, we aim to achieve four key objectives: 1) Minimizing false negative access decisions, 2) minimizing false positive access decisions, 3) enhancing network performance by optimizing the application of security service functions, and 4) ensuring network visibility. The paper includes a detailed list of available security service functions and the security actions each can perform based on a comprehensive literature review. It also explains how attributes can be mapped to security service functions to determine when and which security service function needs to be applied to network traffic. The paper also includes detailed use cases to demonstrate the practical implementation of our approach. In the evaluation of these use cases we achieved an accuracy improvement of up to 16% compared to a standard Zero Trust approach that does not integrate traffic classification into access control. Additionally, we reduced false negatives by as much as 93% and false positives by up to 100%. The network performance was enhanced by decreasing service access times by up to 29% and increasing the number of accesses per second by up to 40% during high concurrency.
引用
收藏
页码:197783 / 197815
页数:33
相关论文
共 50 条
  • [31] Network-level analysis of kinase inhibitors
    White, Forest M.
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2007, 234
  • [32] On the evaluation and selection of network-level traffic control policies: Perimeter control, TUC, and their combination
    de Souza, Felipe
    Saucedo, Rafael Minatto
    Mousavizadeh, Omid
    Carlson, Rodrigo Castelan
    Keyvan-Ekbatani, Mehdi
    TRANSPORTATION RESEARCH PART A-POLICY AND PRACTICE, 2024, 186
  • [33] Network-level Mechanisms of Ketamine Anesthesia
    Mashour, George A.
    ANESTHESIOLOGY, 2016, 125 (05) : 830 - 831
  • [34] Network-Level Adversaries in Federated Learning
    Severi, Giorgio
    Jagielski, Matthew
    Yar, Gokberk
    Wang, Yuxuan
    Oprea, Alina
    Nita-Rotaru, Cristina
    2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2022, : 19 - 27
  • [35] Network-level analysis of kinase inhibitors
    White, M.
    CHEMICAL RESEARCH IN TOXICOLOGY, 2007, 20 (12) : 2018 - 2018
  • [36] Understanding the network-level behavior of sparrimers
    Ramachandran, Anirudh
    Feamster, Nick
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (04) : 291 - 302
  • [37] Network-Level Pavement Structural Evaluation
    Rada, Gonzalo R.
    Nazarian, Soheil
    Siddharthan, Raj V.
    Thyagarajan, Senthilmurugan
    Visintine, Beth A.
    Nasimifar, Mahdi
    Velarde, Jorge
    JOURNAL OF INFRASTRUCTURE SYSTEMS, 2018, 24 (04)
  • [38] Research on security communication and access control of grid service
    Wang, Yu-Bo
    Chen, Cai-Sen
    Wang, Xi-Ren
    Ma, Xiang-Liang
    Xue, Lei-Ze
    Journal of Computers (Taiwan), 2020, 31 (01) : 261 - 265
  • [39] A Security Framework for Service Overlay Networks: Access Control
    Kurian, Jinu
    Sarac, Kamil
    2008 5TH INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATIONS, NETWORKS AND SYSTEMS (BROADNETS 2008), 2008, : 412 - 419
  • [40] Transport Network Slices with Security Service Level Agreements
    Alemany, P.
    Ayed, D.
    Vilalta, R.
    Munoz, R.
    Bisson, P.
    Casellas, R.
    Martinez, R.
    2020 22ND INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON 2020), 2020,