首页> 外文会议>Military Communications Conference;MILCOM 2012 >Identity-Based Internet Protocol Networking
【24h】

Identity-Based Internet Protocol Networking

机译:基于身份的Internet协议网络

获取原文
获取原文并翻译 | 示例

摘要

The Identity-Based Internet Protocol (IBIP) Network project is experimenting with a new enterprise oriented network architecture using standard Internet Protocol to encode identity (ID) information into the IP packet by a new edge security device referred to as the IBIP policy enforcement point (PEP). This is a variant of a network admission control process that establishes user and host identities as well as provides optional information on host visibility, organizational affiliation, current role, and trust metric (associated with the user and host endpoints). Our motivation is to increase our security posture by leveraging identity, reducing our threat exposure, enhancing situational understanding of our environment, and simplifying network operations. In addition to authentication, we leverage strong anti-spoofing technology to improve accountability. We reduce our threat surface by “hiding” our client hosts and making all infrastructure devices inaccessible. Any attempt to access a hidden host or infrastructure device results in a policy violation attributable to the user/host that caused the violation and provides enhanced situational awareness of such activities. Our servers can also have a “permissible use” policy that ensures that the server only operates across the network per that policy. Finally, as users log in and servers are added to the network all dynamic configurations for access control initiated by such changes are automatically carried out without manual intervention, thereby reducing potential vulnerabilities caused by human errors.
机译:基于身份的Internet协议(IBIP)网络项目正在试验一种新的面向企业的网络体系结构,该体系结构使用标准Internet协议通过称为IBIP策略实施点的新边缘安全设备将身份(ID)信息编码为IP数据包( PEP)。这是网络准入控制过程的一种变体,它可以建立用户和主机身份,并提供有关主机可见性,组织隶属关系,当前角色和信任度(与用户和主机端点关联)的可选信息。我们的动机是通过利用身份,减少威胁暴露,增强对环境的情境理解以及简化网络操作来提高安全状况。除了身份验证,我们还利用强大的反欺骗技术来提高责任感。我们通过“隐藏”客户端主机并使所有基础架构设备不可访问来减少威胁面。任何尝试访问隐藏的主机或基础结构设备的尝试都会导致策略违规,这归因于导致违规的用户/主机,并增强了此类活动的态势感知。我们的服务器还可以具有“允许使用”策略,以确保该服务器仅根据该策略在网络上运行。最后,当用户登录并将服务器添加到网络时,由此类更改启动的用于访问控制的所有动态配置将自动执行,而无需人工干预,从而减少了人为错误导致的潜在漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号