Software Defined Perimeter Monitoring and Blockchain-Based Verification of Policy Mapping

被引:0
|
作者
Akbar, Waleed [1 ]
Rivera, Javier Jose Diaz [1 ]
Ahmed, Khan Talha [1 ]
Muhammad, Afaq [1 ]
Song, Wang-Cheol [1 ]
机构
[1] Jeju Natl Univ, Dept Comp Engn, Jeju Si, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence of Zero Trust (ZT) Architecture, industry leaders have been drawn to the technology because of its potential to handle a high level of security threats. The Zero Trust Architecture (ZTA) is paving the path for a security industrial revolution by eliminating location-based implicant access and focusing on asset, user, and resource security. Software Defined Perimeter (SDP) is a secure overlay network technology that can be used to implement a Zero Trust framework. SDP is a next-generation network technology that allows network architecture to be hidden from the outside world. It also hides the overlay communication from the underlay network by employing encrypted communications. With encrypted information, detecting abnormal behavior of entities on an overlay network becomes exceedingly difficult. Therefore, an automated system is required. We proposed a method in this paper for understanding the normal behavior of deployed polices by mapping network usage behavior to the policy. An Apache Spark collects and processes the streaming overlay monitoring data generated by the built-in fabric API in order to do this mapping. It sends extracted metrics to Prometheus for storage, and then uses the data for machine learning training and prediction. The cluster-id of the link that it belongs to is predicted by the model, and the cluster-ids are mapped onto the policies. To validate the legitimacy of policy, the labeled polices hash is compared to the actual polices hash that is obtained from blockchain. Unverified policies are notified to the SDP controller for additional action, such as defining new policy behavior or marking uncertain policies.
引用
收藏
页码:407 / 410
页数:4
相关论文
共 50 条
  • [1] Consortium Blockchain-Based Secure Software Defined Vehicular Network
    Zhao, Ning
    Wu, Hao
    Zhao, Xiaonan
    MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 314 - 327
  • [2] Consortium Blockchain-Based Secure Software Defined Vehicular Network
    Ning Zhao
    Hao Wu
    Xiaonan Zhao
    Mobile Networks and Applications, 2020, 25 : 314 - 327
  • [3] A Blockchain-Based Security Traffic Measurement Approach to Software Defined Networking
    Huo, Liuwei
    Jiang, Dingde
    Qi, Sheng
    Miao, Lei
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (02): : 586 - 596
  • [4] Blockchain-Based Secure Distributed Control for Software Defined Optical Networking
    Yang, Hui
    Liang, Yongshen
    Yao, Qiuyan
    Guo, Shaoyong
    Yu, Ao
    Zhang, Jie
    CHINA COMMUNICATIONS, 2019, 16 (06) : 42 - 54
  • [5] On the Design of Blockchain-Based Access Control Scheme for Software Defined Networks
    Chattaraj, Durbadal
    Saha, Sourav
    Bera, Basudeb
    Das, Ashok Kumar
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 237 - 242
  • [6] A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking
    Li, Wenjuan
    Tan, Jiao
    Wang, Yu
    NETWORK AND SYSTEM SECURITY, NSS 2020, 2020, 12570 : 261 - 276
  • [7] A Blockchain-Based Security Traffic Measurement Approach to Software Defined Networking
    Liuwei Huo
    Dingde Jiang
    Sheng Qi
    Lei Miao
    Mobile Networks and Applications, 2021, 26 : 586 - 596
  • [8] Blockchain-Based Secure Distributed Control for Software Defined Optical Networking
    Hui Yang
    Yongshen Liang
    Qiuyan Yao
    Shaoyong Guo
    Ao Yu
    Jie Zhang
    中国通信, 2019, 16 (06) : 42 - 54
  • [9] Blockchain-based Software Engineering
    Beller, Moritz
    Hejderup, Joseph
    2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: NEW IDEAS AND EMERGING RESULTS (ICSE-NIER 2019), 2019, : 53 - 56
  • [10] Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions
    Li, Wenjuan
    Meng, Weizhi
    Liu, Zhigiang
    Au, Man-Ho
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (02) : 196 - 203