Removing the Reliance on Perimeters for Security using Network Views

6Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Traditional enterprise security relies on network perimeters to define and enforce network security policies. Emerging application-focused Zero Trust architectures attempt to address this long-standing challenge by moving business applications to the cloud and performing enhanced identity and access control checks within a web gateway. However, these solutions ignore the security needs of workstations, development servers, and device management interfaces. In this work, we propose Network Views (abbrev. NetViews) for least-privilege network access control where each host has a different, limited view of the other hosts and services within a network. We present an SDN-based design and demonstrate that our implementation has network latency and throughput comparable to baseline reactive forwarding. We further provide an optimization for multi-connection flows that significantly reduces both redundant access control checks and forwarding state storage in switches. As such, NetViews provides a practical primitive for removing the reliance on security perimeters within enterprise networks.

Cite

CITATION STYLE

APA

Anjum, I., Kostecki, D., Leba, E., Sokal, J., Bharambe, R., Enck, W., … Reaves, B. (2022). Removing the Reliance on Perimeters for Security using Network Views. In Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT (pp. 151–162). Association for Computing Machinery. https://doi.org/10.1145/3532105.3535029

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free