Integration of Security Service Functions Into Network-Level Access Control

被引:0
|
作者
Bradatsch, Leonard [1 ]
Kargl, Frank [1 ]
机构
[1] Ulm Univ, Inst Distributed Syst, D-89077 Ulm, Germany
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Security; IP networks; Access control; Authentication; Logic; Performance evaluation; Multiprotocol label switching; Inspection; Zero Trust; Process control; Network security; traffic steering; service function chaining; access control; zero trust;
D O I
10.1109/ACCESS.2024.3522575
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Service function chaining is an approach to dynamically steer traffic through different service functions like intrusion prevention systems within a local area network. Existing approaches to determining the set of service functions through which specific traffic is steered are relatively coarse-grained. In this article, which focuses on security-related service functions, we present a more fine-grained determination process by integrating security service functions into attribute-based access control and utilizing contextual information attributes, such as access time. By mapping attributes to security service functions, we aim to achieve four key objectives: 1) Minimizing false negative access decisions, 2) minimizing false positive access decisions, 3) enhancing network performance by optimizing the application of security service functions, and 4) ensuring network visibility. The paper includes a detailed list of available security service functions and the security actions each can perform based on a comprehensive literature review. It also explains how attributes can be mapped to security service functions to determine when and which security service function needs to be applied to network traffic. The paper also includes detailed use cases to demonstrate the practical implementation of our approach. In the evaluation of these use cases we achieved an accuracy improvement of up to 16% compared to a standard Zero Trust approach that does not integrate traffic classification into access control. Additionally, we reduced false negatives by as much as 93% and false positives by up to 100%. The network performance was enhanced by decreasing service access times by up to 29% and increasing the number of accesses per second by up to 40% during high concurrency.
引用
收藏
页码:197783 / 197815
页数:33
相关论文
共 50 条
  • [41] Application-level versus network-level proximity
    Malli, M
    Barakat, C
    Dabbous, W
    TECHNOLOGIES FOR ADVANCED HETEROGENEOUS NETWORKS, PROCEEDINGS, 2005, 3837 : 225 - 239
  • [42] Revelio: A Network-Level Privacy Attack in the Lightning Network
    Von Arx, Theo
    Tran, Muoi
    Vanbever, Laurent
    Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023, 2023, : 942 - 957
  • [43] Revelio: A Network-Level Privacy Attack in the Lightning Network
    von Arx, Theo
    Muoi Tran
    Vanbever, Laurent
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 942 - 957
  • [44] Network-level signal predictive control with real-time routing information
    Lin, Shichao
    Dai, Jingchen
    Li, Ruimin
    TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2023, 147
  • [45] Distributed Voltage Control for Network-level Optimization in Radial Power Distribution Systems
    Sadnan, Rabayet
    Jha, Rahul Ranjan
    Dubey, Anamika
    2020 52ND NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2021,
  • [46] Dynamic Network-Level Traffic Speed and Signal Control in Connected Vehicle Environment
    Yuan, Zihao
    Zeng, Xiaoqing
    SENSORS, 2024, 24 (20)
  • [47] Ontology-Based Information Flow Control of Network-Level Internet Communication
    Kasten, Andreas
    Scherp, Ansgar
    INTERNATIONAL JOURNAL OF SEMANTIC COMPUTING, 2015, 9 (01) : 1 - 45
  • [48] Network-level performance evaluation of a two-relay cooperative random access wireless system
    Papadimitriou, Georgios
    Pappas, Nikolaos
    Traganitis, Apostolos
    Angelakis, Vangelis
    COMPUTER NETWORKS, 2015, 88 : 187 - 201
  • [49] Integration of the Procedure of Access to a Multiple Service Integrated Network.
    Montemurro, R.
    Vilanni F.
    Note, recensioni, notizie, 1980, 29 (03): : 119 - 150
  • [50] Network-Level Cooperation for a Multiple-Access Channel Via Dynamic Decode-and-Forward
    Krikidis, Ioannis
    Rong, Beiyu
    Ephremides, Anthony
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (12) : 7759 - 7770