Risk Assessment on Hardware Offloading Architecture of Network Security Protocols with Linux-based Control Plane

被引:1
作者
Bermejo, Oscar Gotor [1 ,2 ]
Dik, Daniel [1 ,2 ]
Berger, Michael Stubert [2 ]
机构
[1] Comcores ApS, Lyngby, Denmark
[2] Tech Univ Denmark, Lyngby, Denmark
来源
2023 19TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS, DRCN | 2023年
关键词
Linux; MACsec; risk assessment; security;
D O I
10.1109/DRCN57075.2023.10108289
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Linux Operating System is used worldwide in communication devices hosting multipurpose applications. With the evolving communication infrastructure, such as 5G cellular networks, critical applications with strict high-performance requirements will be developed and also rely on Linux. Due to the nature of these applications, security needs to be ensured in addition to performance. Linux provides softwarebased implementations of network security protocols. However, their performance is limited by the CPUs they are running on. To meet higher performance, the data plane of security protocols needs to be offloaded to dedicated hardware, such as FPGAs and ASICs, with the control plane kept in software. The resulting system architecture introduces a new attack surface where vulnerabilities can be exploited that threaten the control plane. This can reveal sensitive control information or cause a Denial-of-Service attack. This paper presents a risk assessment of the hardware offloading system architecture of security protocols with Linux-based control plane. The data link layer security protocol MACsec was chosen as a reference use case, however, the assessment framework can be applied to other security protocols as they share a similar architecture. Twelve risks were identified during the analysis, which elucidates the urgent need of security measures to protect this type of architecture from possible threats and attacks. Additionally, this paper proposes a set of control recommendations to reduce the impact of the identified threats.
引用
收藏
页数:8
相关论文
共 17 条
[1]  
[Anonymous], 2020, IEEE Std 802.1X-2020
[2]  
[Anonymous], 2012, NIST Special Publication 800-61 Revision 2: Computer Security Incident Handling Guide
[3]  
[Anonymous], 2018, IEEE Standard 802.1AE-2018
[4]  
cve, CVE PROGR MISS
[5]   Transport Security Considerations for the Open-RAN Fronthaul [J].
Dik, Daniel ;
Berger, Michael Stubert .
2021 IEEE 4TH 5G WORLD FORUM (5GWF 2021), 2021, :253-258
[6]  
docs.kernel, LIN KERN
[7]  
Eclipse Foundation, 2022, 2022 IoT & Edge Developer Survey Report
[8]  
Harshitha B, 2015, International Journal of Networks and Systems
[9]  
kernel, LIN MAN PAG PROJ
[10]  
Mohanta Abhijit, 2020, Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect