Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture

被引:5
作者
Xu, Mingyang [1 ]
Guo, Junli [2 ]
Yuan, Haoyu [1 ]
Yang, Xinyu [1 ]
机构
[1] Zhengzhou Univ, Sch Cyber Sci & Engn, Zhengzhou 450011, Peoples R China
[2] Zhengzhou Univ, ZHONGYUAN Network Secur Res Inst, Zhengzhou 450011, Peoples R China
关键词
single packet authorization; zero-trust security; endogenous security architecture; authentication security;
D O I
10.3390/electronics12040782
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Zero-trust security architecture reconstructs the trust foundation of access control based on authentication and authorization by continuously authenticating the terminal during the authentication process and not relying solely on geographic location/user attributes as the sole basis for the trust assessment. However, due to the fine-grained verification of identity under the zero-trust security architecture, there is a need for multiple authentication and authorization processes. If a single policy engine has unknown vulnerabilities and unknown backdoors to be maliciously attacked, or DDOS attacks initiated by known vulnerabilities cannot be prevented, the policy engine based on this control center architecture cannot meet the requirements of system security and reliability. Therefore, it is proposed to apply the SPA single-package authorization and endogenous security architecture to the zero-trust authentication system, which can realize the reliability, dynamism and diversity of system defense. Through the experimental antiattack analysis and antiattack test, the test from the proposed scheme found that when the system introduces the endogenous security architecture, the security of the system can be improved due to the complexity of the attack process and the increase in the cost of the attack. The test through both the security and system overhead found that the scheme can effectively improve the security of the system while ensuring the quality of network services, compared to the traditional scheme. It was found that the scheme can effectively improve the security of the system while ensuring the quality of network services and has better adaptability than the traditional zero-trust authentication scheme.
引用
收藏
页数:21
相关论文
共 38 条
  • [1] Ahmed I., 2020, P ICCA 2020 INT C CO
  • [2] Al Hwaitat AK, 2020, INT J ADV COMPUT SC, V11, P614
  • [3] Al Nafea Roaa, 2021, 2021 International Conference on Information Technology (ICIT), P779, DOI 10.1109/ICIT52682.2021.9491638
  • [4] Alamer Maryam, 2021, 2021 International Conference on Information Technology (ICIT), P719, DOI 10.1109/ICIT52682.2021.9491123
  • [5] Albuali A., 2020, P CLOUD 2020
  • [6] Almaiah M. A., 2020, Int. J. Electr. Comput. Eng. (IJECE), V10, P6461, DOI DOI 10.11591/IJECE.V10I6.PP6461-6471
  • [7] Almaiah MA., 2021, Artificial Intelligence and Blockchain for Future Cybersecurity Applications, P217, DOI [10.1007/978-3-030-74575-212, DOI 10.1007/978-3-030-74575-212]
  • [8] Almaiah MohammedAmin., 2021, Artificial Intelligence and Blockchain for Future Cybersecurity Applications
  • [9] On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond
    Bello, Yahuza
    Hussein, Ahmed Refaey
    Ulema, Mehmet
    Koilpillai, Juanita
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1876 - 1889
  • [10] Security boundaries in mobile ambients
    Braghin, C
    Cortesi, A
    Focardi, R
    [J]. COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2002, 28 (01) : 101 - 127