Programmable In-Network Security for Context-aware BYOD Policies

被引:0
|
作者
Kang, Qiao [1 ]
Xue, Lei [2 ]
Morrison, Adam [1 ]
Tang, Yuxin [1 ]
Chen, Ang [1 ]
Luo, Xiapu [2 ]
机构
[1] Rice Univ, Houston, TX 77251 USA
[2] Hong Kong Polytech Univ, Hong Kong, Peoples R China
关键词
AUTHENTICATION; FRAMEWORK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bring Your Own Device (BYOD) has become the new norm for enterprise networks, but BYOD security remains a top concern. Context-aware security, which enforces access control based on dynamic runtime context, is a promising approach. Recent work has developed SDN solutions to collect device contexts and enforce access control at a central controller. However, the central controller could become a bottleneck and attack target. Processing context signals at the remote controller is also too slow for real-time decision change. We present a new paradigm, programmable in-network security (Poise), which is enabled by the emergence of programmable switches. At the heart of Poise is a novel security primitive, which can be programmed to support a wide range of context-aware policies in hardware. Users of Poise specify concise policies, and Poise compiles them into different configurations of the primitive in P4. Compared with traditional SDN defenses, Poise is resilient to control plane saturation attacks, and it dramatically increases defense agility.
引用
收藏
页码:595 / 612
页数:18
相关论文
共 50 条
  • [1] A Generic Framework for Representing Context-Aware Security Policies in the Cloud
    Veloudis, Simeon
    Paraskakis, Iraklis
    Verginadis, Yiannis
    Patiniotakis, Ioannis
    Mentzas, Gregoris
    [J]. CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2016, 2017, 740 : 338 - 358
  • [2] In-network Processing for Context-Aware SOA-based Manufacturing Systems
    Derhamy, Hasan
    Eliasson, Jens
    Delsing, Jerker
    van Deventer, Jan
    [J]. IECON 2017 - 43RD ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2017, : 3460 - 3465
  • [3] Towards a specification scheme for context-aware security policies for networked appliances
    Watanabe, T
    Yamada, K
    Nagatou, N
    [J]. WSTFES 2003: IEEE WORKSHOP ON SOFTWARE TECHNOLOGIES FOR FUTURE EMBEDDED SYSTEMS, PROCEEDINGS, 2003, : 65 - 68
  • [4] Evaluating confidence in context for context-aware security
    Lacoste, Marc
    Privat, Gilles
    Ramparany, Fano
    [J]. AMBIENT INTELLIGENCE, PROCEEDINGS, 2007, 4794 : 211 - 229
  • [5] Context-Aware Handover Policies in HetNets
    Guidolin, Francesco
    Pappalardo, Irene
    Zanella, Andrea
    Zorzi, Michele
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (03) : 1895 - 1906
  • [6] Towards programmable context-aware voice services
    Jean, K
    Vardalachos, N
    Galis, A
    [J]. INTELLIGENCE IN COMMUNICATION SYSTEMS, 2005, 190 : 231 - 247
  • [7] Intelligent Assistant for Context-Aware Policies
    Balinsky, Helen
    Moore, Neil C. A.
    Simske, Steven J.
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 621 - 630
  • [8] Expectation aware in-network context processing
    Sigg, Stephan
    Beigl, Michael
    [J]. 4TH ACM INTERNATIONAL WORKSHOP ON CONTEXT-AWARENESS FOR SELF-MANAGING SYSTEMS (CASEMANS 2010), 2010, : 59 - 64
  • [9] The Use of Context-Aware Policies and Ontologies to Facilitate Business-Aware Network Management
    Strassner, John
    van der Meer, Sven
    O'Sullivan, Declan
    Dobson, Simon
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2009, 17 (03) : 255 - 284
  • [10] Dynamic deployment of context-aware access control policies for constrained security devices
    Preda, Stere
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Garcia-Alfaro, Joaquin
    Toutain, Laurent
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (07) : 1144 - 1159