ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture

被引:3
作者
Bradatsch, Leonard [1 ]
Miroshkin, Oleksandr [2 ]
Kargl, Frank [1 ]
机构
[1] Ulm Univ, Inst Distributed Syst, D-89077 Ulm, Germany
[2] Ulm Univ, Commun & Informat Ctr, D-879077 Ulm, Germany
关键词
Zero Trust; IP networks; Authentication; Security; Inspection; Service function chaining; Network security; Network performance; network security; zero trust; access control; service function chaining;
D O I
10.1109/ACCESS.2023.3330706
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, zero trust security has received notable attention in the security community. However, while many networks use monitoring and security functions like firewalls, their integration in the design of zero trust architectures remains largely unaddressed. In this article, we contribute with respect to this aspect a novel network security architecture called Zero Trust Service Function Chaining (ZTSFC). With ZTSFC, we achieve three main improvements over zero trust architectures: (1) the zero trust components can directly integrate other monitoring and security functions into their access decisions, (2) an efficient flow of information between zero trust components, monitoring, and security functions are achieved, and (3) ZTSFC improves the performance with respect to hardware load and user experience. As proof of concept, we implemented a publicly available ZTSFC prototype based on HTTPS and the policy language ALFA. Using this prototype, we demonstrate the achievement of all three improvements in representative use cases. In addition, our performance evaluation compares ZTSFC with a regular zero trust network without ZTSFC. The results indicate that ZTSFC can reduce CPU usage by 25% for specific monitoring and security functions in certain scenarios. Overall, we also observed a 30% decrease in the time it takes to access services with ZTSFC.
引用
收藏
页码:125307 / 125327
页数:21
相关论文
共 61 条
  • [11] SAND: semi-automated adaptive network defense via programmable rule generation and deployment
    Chen, Haoyu
    Zou, Deqing
    Jin, Hai
    Xu, Shouhuai
    Yuan, Bin
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (07)
  • [12] Cittadini L., 2016, Login, V41, P28
  • [13] A Proposal on Enhancing XACML with Continuous Usage Control Features
    Colombo, Maurizio
    Lazouski, Aliaksandr
    Martinelli, Fabio
    Mori, Paolo
    [J]. GRIDS, P2P AND SERVICES COMPUTING, 2010, : 133 - +
  • [14] Cunningham C., 2018, Tech. Rep. RES137210
  • [15] Web server performance measurement and modeling techniques
    Dilley, J
    Friedrich, R
    Jin, T
    Rolia, J
    [J]. PERFORMANCE EVALUATION, 1998, 33 (01) : 5 - 26
  • [16] Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things
    Dimitrakos, Theo
    Dilshener, Tezcan
    Kravtsov, Alexander
    La Marra, Antonio
    Martinelli, Fabio
    Rizos, Athanasios
    Rosetti, Alessandro
    Saracino, Andrea
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1801 - 1812
  • [17] Factors affecting the successful realisation of benefits from systems development projects: findings from three case studies
    Doherty, Neil F.
    Ashurst, Colin
    Peppard, Joe
    [J]. JOURNAL OF INFORMATION TECHNOLOGY, 2012, 27 (01) : 1 - 16
  • [18] Eidle D, 2017, 2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), P288, DOI 10.1109/UEMCON.2017.8249053
  • [19] Escobedo V., 2017, Login, V42, P38
  • [20] Farrel A., 2019, document RFC 8595