Software Defined Perimeter Monitoring and Blockchain-Based Verification of Policy Mapping

被引:0
|
作者
Akbar, Waleed [1 ]
Rivera, Javier Jose Diaz [1 ]
Ahmed, Khan Talha [1 ]
Muhammad, Afaq [1 ]
Song, Wang-Cheol [1 ]
机构
[1] Jeju Natl Univ, Dept Comp Engn, Jeju Si, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence of Zero Trust (ZT) Architecture, industry leaders have been drawn to the technology because of its potential to handle a high level of security threats. The Zero Trust Architecture (ZTA) is paving the path for a security industrial revolution by eliminating location-based implicant access and focusing on asset, user, and resource security. Software Defined Perimeter (SDP) is a secure overlay network technology that can be used to implement a Zero Trust framework. SDP is a next-generation network technology that allows network architecture to be hidden from the outside world. It also hides the overlay communication from the underlay network by employing encrypted communications. With encrypted information, detecting abnormal behavior of entities on an overlay network becomes exceedingly difficult. Therefore, an automated system is required. We proposed a method in this paper for understanding the normal behavior of deployed polices by mapping network usage behavior to the policy. An Apache Spark collects and processes the streaming overlay monitoring data generated by the built-in fabric API in order to do this mapping. It sends extracted metrics to Prometheus for storage, and then uses the data for machine learning training and prediction. The cluster-id of the link that it belongs to is predicted by the model, and the cluster-ids are mapped onto the policies. To validate the legitimacy of policy, the labeled polices hash is compared to the actual polices hash that is obtained from blockchain. Unverified policies are notified to the SDP controller for additional action, such as defining new policy behavior or marking uncertain policies.
引用
收藏
页码:407 / 410
页数:4
相关论文
共 50 条
  • [31] An Ontology for Software Patterns: Application to Blockchain-Based Software Development
    Six, Nicolas
    Correa-Restrepo, Camilo
    Herbaut, Nicolas
    Salinesi, Camille
    ENTERPRISE DESIGN, OPERATIONS, AND COMPUTING: EDOC 2022 WORKSHOPS, IDAMS 2022, SOEA4EE 2022, TEAR 2022, 2023, 466 : 284 - 299
  • [32] A Platform Selection Framework for Blockchain-Based Software Systems Based on the Blockchain Trilemma
    Werth, Jan
    El Ioini, Nabil
    Berenjestanaki, Mohammad Hajian
    Barzegar, Hamid R.
    Pahl, Claus
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2023, 2023, : 362 - 371
  • [33] Detecting Counterfeit ICs with Blockchain-based Verification Framework
    Huang, Chin-Tser
    Njilla, Laurent
    Geng, Tieming
    2020 IEEE INTERNATIONAL SMART CITIES CONFERENCE (ISC2), 2020,
  • [34] RIVAChain: Blockchain-based Integrity Verification for File Transfers
    Alhussen, Ahmed
    Arslan, Engin
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 3255 - 3261
  • [35] Cerberus: A Blockchain-Based Accreditation and Degree Verification System
    Tariq, Aamna
    Haq, Hina Binte
    Ali, Syed Taha
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (04): : 1503 - 1514
  • [36] MonitorChain: An Extensible Tool for Real-Time Monitoring of Blockchain-Based Software Applications
    Araujo, Andre
    Soares, Rendrikson
    Santos, Waldsson
    IEEE ACCESS, 2024, 12 : 147784 - 147797
  • [37] Blockchain-Based Log Verification System for Cloud Forensics
    AGBEDANU Promise Ricardo
    王鹏伟
    雷颖慧
    NORTEY Richard N
    RASOOL Abdul
    ODARTEY Lamptey K
    JournalofDonghuaUniversity(EnglishEdition), 2021, 38 (05) : 449 - 458
  • [38] A Novel Blockchain-based Education Records Verification Solution
    Han, Meng
    Li, Zhigang
    He, Jing
    Wu, Dalei
    Xie, Ying
    Baba, Asif
    SIGITE'18: PROCEEDINGS OF THE 19TH ANNUAL SIG CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION, 2018, : 178 - 183
  • [39] A Permissioned Blockchain-Based System for Verification of Academic Records
    Badr, Ahmed
    Rafferty, Laura
    Mahmoud, Qusay H.
    Elgazzar, Khalid
    Hung, Patrick C. K.
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [40] EntrapNet: A Blockchain-Based Verification Protocol for Trustless Computing
    Li, Chong
    Zhang, Lei
    Fang, Senbiao
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11): : 8024 - 8035