Netinfo Security ›› 2020, Vol. 20 ›› Issue (8): 37-46.doi: 10.3969/j.issn.1671-1122.2020.08.005

Previous Articles     Next Articles

A SDN Access Control Mechanism Based on Zero Trust

WU Yunkun1(), JIANG Bo2, PAN Ruixuan3, LIU Yuling4   

  1. 1. University of Chinese Academy of Sciences, Beijing 100049, China
    2. China Academy of Information and Communications Technology, Beijing, 100191, China
    3. Information Engineering University, Zhengzhou 450004, China
    4. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100190, China
  • Received:2020-06-08 Online:2020-08-10 Published:2020-10-20
  • Contact: WU Yunkun E-mail:wuyunkun@qianxin.com

Abstract:

Software defined network (SDN) is a new network architecture which separates logic control and data forwarding. It can provide the Internet with smooth evolution ability to meet the current and future needs.SDN not only becomes a new development direction of future internet, but also gives a new way to solve the problem of network security. At present, SDN network lacks effective network dynamic access control mechanism. Therefore, this paper proposes a zero-trust based access control method for SDN network. Firstly, the security concept of "zero trust" is introduced to construct the network access control framework under SDN network. The proposed framework achieves the real-time monitoring and trust measurement of insider user behaviors. Moreover, it can adjust user resource access privilege according to the measurement results dynamically. Then, the set of user behavior trust metrics for SDN network is designed, and the behavior metrics supported by Openflow in SDN network are selected to make the index results easy to measure. The dynamic measurement mechanism of user trust based on behavior as well as the SDN network resource access control using flow table is proposed. From the viewpoint of "never trust and always verify", the behavior of users in the network is monitored periodically, and the trust value of users is measured according to their behavior data. When the user trust degree drops to an untrusted degree, the flow table is quickly issued to prevent the user from continuing to access the network. Finally, the effectiveness of the proposed model and method is verified by simulations. The experiments show that our method can achieve more fine-grained and dynamic access control.

Key words: SDN network, access control, zero trust, cloud theory, credible measurement

CLC Number: