信息网络安全 ›› 2023, Vol. 23 ›› Issue (6): 1-10.doi: 10.3969/j.issn.1671-1122.2023.06.001

• 等级保护 • 上一篇    下一篇

基于软件定义边界的服务保护方案

黄杰1,2, 何城鋆1()   

  1. 1.东南大学网络空间安全学院,南京 211189
    2.网络通信与安全紫金山实验室,南京 211189
  • 收稿日期:2023-02-10 出版日期:2023-06-10 发布日期:2023-06-20
  • 通讯作者: 何城鋆 hechengjunfox@gmail.com
  • 作者简介:黄杰(1970—),男,湖北,教授,博士,主要研究方向为物联网安全、无线网络安全、大数据安全|何城鋆(1998—),男,江苏,硕士研究生,主要研究方向为访问控制
  • 基金资助:
    国家重点研发计划(2018YFB2100400)

Service Protection Scheme Based on Software Defined Perimeter

HUANG Jie1,2, HE Chengjun1()   

  1. 1. School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China
    2. Purple Mountain Laboratories for Network and Communication Security, Nanjing 211189, China
  • Received:2023-02-10 Online:2023-06-10 Published:2023-06-20

摘要:

针对在零信任环境下,基于物理边界防护的传统网络安全架构逐渐被瓦解而导致的服务暴露问题,文章提出一种基于软件定义边界的服务保护方案。通过收集请求终端的用户属性和设备属性以对终端进行授权判定;使用单包授权认证机制进行先认证后连接,实现服务隐藏、身份认证及访问控制等功能;基于零信任持续认证的思想,在操作系统启动前基于固件层对访问终端进行初始度量,在操作系统启动后基于服务进行持续度量;最后,基于AHP设计信任评估算法对终端进行安全评估。从性能与安全性两方面进行分析,结果证明该方案能有效提高通信效率并抵御多种网络安全攻击。

关键词: 零信任, 软件定义边界, 单包授权认证, 设备安全, 层次分析法

Abstract:

Aiming at the issue of service exposure resulting from the gradual collapse of the traditional network security architecture based on physical perimeter protection under a zero-trust environment, this paper proposed a service protection scheme based on software defined perimeter. The terminal was authorized by gathering user and device attributes of the request terminal. The single packet authorization mechanism performed authentication before connection, enabling features such as service hiding, identity authentication, and access control. Based on the concept of zero-trust continuous authentication, this scheme measured the access terminal at the firmware layer before initializing the operating system, and then constantly measured it depending on the service after the operating system was initialized. Finally, a trust evaluation algorithm based on analytic hierarchy process(AHP) was designed to assess terminal security. Results from the analysis of performance and security show that this scheme can effectively improve communication efficiency and withstand a variety of network security attacks.

Key words: zero trust, software defined perimeter, single packet authorization, device security, analytic hierarchy process

中图分类号: