ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture

被引:3
作者
Bradatsch, Leonard [1 ]
Miroshkin, Oleksandr [2 ]
Kargl, Frank [1 ]
机构
[1] Ulm Univ, Inst Distributed Syst, D-89077 Ulm, Germany
[2] Ulm Univ, Commun & Informat Ctr, D-879077 Ulm, Germany
关键词
Zero Trust; IP networks; Authentication; Security; Inspection; Service function chaining; Network security; Network performance; network security; zero trust; access control; service function chaining;
D O I
10.1109/ACCESS.2023.3330706
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, zero trust security has received notable attention in the security community. However, while many networks use monitoring and security functions like firewalls, their integration in the design of zero trust architectures remains largely unaddressed. In this article, we contribute with respect to this aspect a novel network security architecture called Zero Trust Service Function Chaining (ZTSFC). With ZTSFC, we achieve three main improvements over zero trust architectures: (1) the zero trust components can directly integrate other monitoring and security functions into their access decisions, (2) an efficient flow of information between zero trust components, monitoring, and security functions are achieved, and (3) ZTSFC improves the performance with respect to hardware load and user experience. As proof of concept, we implemented a publicly available ZTSFC prototype based on HTTPS and the policy language ALFA. Using this prototype, we demonstrate the achievement of all three improvements in representative use cases. In addition, our performance evaluation compares ZTSFC with a regular zero trust network without ZTSFC. The results indicate that ZTSFC can reduce CPU usage by 25% for specific monitoring and security functions in certain scenarios. Overall, we also observed a 30% decrease in the time it takes to access services with ZTSFC.
引用
收藏
页码:125307 / 125327
页数:21
相关论文
共 61 条
  • [1] [Anonymous], 2018, document RFC 8300
  • [2] [Anonymous], 2014, McAfee Report Reveals Organizations Choose Network Performance Over Advanced Security Features
  • [3] [Anonymous], 2023, Speak
  • [4] Deep packet inspection tools and techniques in commodity platforms: Challenges and trends
    Antonello, Rafael
    Fernandes, Stenio
    Kamienski, Carlos
    Sadok, Djamel
    Kelner, Judith
    Godor, Istvan
    Szabo, Geza
    Westholm, Tord
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1863 - 1878
  • [5] Bestavros A., 1995, Proceedings of the 1995 ACM CIKM International Conference on Information and Knowledge Management, P403, DOI 10.1145/221270.221653
  • [6] Bjork P., 2019, Zero Trust Secure Access to Traditional Applications with VMware
  • [7] Boucadair M., 2016, Service Function Chaining (SFC) Control Plane Components & Requirements
  • [8] Bradatsch L., 2021, P C NETW SYST EL COM, V80, P1
  • [9] Secure Service Function Chaining in the Context of Zero Trust Security
    Bradatsch, Leonard
    Haeberle, Marco
    Steinert, Benjamin
    Kargl, Frank
    Menth, Michael
    [J]. PROCEEDINGS OF THE 2022 47TH IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2022), 2022, : 123 - 131
  • [10] Brockners F., 2020, Proof of transit