Software Defined Perimeter Monitoring and Blockchain-Based Verification of Policy Mapping

Waleed Akbar, Javier Jose Diaz Rivera, Khan Talha Ahmed, Afaq Muhammad, Wang Cheol Song*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

With the emergence of Zero Trust (ZT) Architecture, industry leaders have been drawn to the technology because of its potential to handle a high level of security threats. The Zero Trust Architecture (ZTA) is paving the path for a security industrial revolution by eliminating location-based implicant access and focusing on asset, user, and resource security. Software Defined Perimeter (SDP) is a secure overlay network technology that can be used to implement a Zero Trust framework. SDP is a next-generation network technology that allows network architecture to be hidden from the outside world. It also hides the overlay communication from the underlay network by employing encrypted communications. With encrypted information, detecting abnormal behavior of entities on an overlay network becomes exceedingly difficult. Therefore, an automated system is required. We proposed a method in this paper for understanding the normal behavior of deployed polices by mapping network usage behavior to the policy. An Apache Spark collects and processes the streaming overlay monitoring data generated by the built-in fabric API in order to do this mapping. It sends extracted metrics to Prometheus for storage, and then uses the data for machine learning training and prediction. The cluster-id of the link that it belongs to is predicted by the model, and the cluster-ids are mapped onto the policies. To validate the legitimacy of policy, the labeled polices hash is compared to the actual polices hash that is obtained from blockchain. Unverified policies are notified to the SDP controller for additional action, such as defining new policy behavior or marking uncertain policies.

Original languageEnglish
Title of host publicationAPNOMS 2022 - 23rd Asia-Pacific Network Operations and Management Symposium
Subtitle of host publicationData-Driven Intelligent Management in the Era of beyond 5G
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9784885523397
DOIs
StatePublished - 2022
Externally publishedYes
Event23rd Asia-Pacific Network Operations and Management Symposium, APNOMS 2022 - Takamatsu, Japan
Duration: 28 Sep 202230 Sep 2022

Publication series

NameAPNOMS 2022 - 23rd Asia-Pacific Network Operations and Management Symposium: Data-Driven Intelligent Management in the Era of beyond 5G

Conference

Conference23rd Asia-Pacific Network Operations and Management Symposium, APNOMS 2022
Country/TerritoryJapan
CityTakamatsu
Period28/09/2230/09/22

Bibliographical note

Publisher Copyright:
© 2022 IEICE.

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Software Defined Perimeter Monitoring and Blockchain-Based Verification of Policy Mapping'. Together they form a unique fingerprint.

Cite this