Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 21 von 29
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2019, p.447-459
2019
Volltextzugriff (PDF)

Details

Autor(en) / Beteiligte
Titel
Controller-Oblivious Dynamic Access Control in Software-Defined Networks
Ist Teil von
  • 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2019, p.447-459
Ort / Verlag
IEEE
Erscheinungsjahr
2019
Quelle
IEEE Electronic Library (IEL)
Beschreibungen/Notizen
  • Conventional network access control approaches are static (e.g., user roles in Active Directory), coarse-grained (e.g., 802.1x), or both (e.g., VLANs). Such systems are unable to meaningfully stop or hinder motivated attackers seeking to spread throughout an enterprise network. To address this threat, we present Dynamic Flow Isolation (DFI), a novel architecture for supporting dynamic, fine-grained access control policies enforced in a Software-Defined Network (SDN). These policies can emit and revoke specific access control rules automatically in response to network events like users logging off, letting the network adaptively reduce unnecessary reachability that could be potentially leveraged by attackers. DFI is oblivious to the SDN controller implementation and processes new packets prior to the controller, making DFI's access control resilient to a malicious or faulty controller or its applications. We implemented DFI for OpenFlow networks and demonstrated it on an enterprise SDN testbed with around 100 end hosts and servers. Finally, we evaluated the performance of DFI and how it enables a novel policy, which is otherwise difficult to enforce, that protects against a surrogate of the recent NotPetya malware in an infection scenario. We found that the threat was most limited in its ability to spread using our policy, which automatically restricted network flows over the course of the attack, compared to no access control or a static role-based policy.
Sprache
Englisch
Identifikatoren
DOI: 10.1109/DSN.2019.00053
Titel-ID: cdi_ieee_primary_8809519

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX