首页> 外文会议>2010 IEEE International Conference on Technologies for Homeland Security >Securing IPv6 network infrastructure: A new security model
【24h】

Securing IPv6 network infrastructure: A new security model

机译:保护IPv6网络基础结构:新的安全模型

获取原文

摘要

Nation's network infrastructure such as the Global Information Grid (GIG) for the Department of Defense (DoD) and the OneNet for the Homeland Security Department are tran-sitioning to the Internet Protocol version 6 (IPv6) per DoD CIO Memorandum of June 2003 and the Office of Management and Budget memorandum OMB-05–22. There exist IPv6 specific security vulnerabilities in these network infrastructures that need to be mitigated in order to achieve security parity with the existing IPv4 operations. From the perspective of the Homeland Security technologies, the existence of additional security vulnerabilities implies a possibility for two pronged threats. First, the IPv6 specific vulnerabilities reduce the security posture of the network infrastructure itself; second, other critical infrastructure sectors that depend on IPv6 need additional protection. For example, the future supervisory control and data acquisition (SCADA) industrial capabilities would increasingly use the IPv6 infrastructure, as would the voice communications, the voice and video collaboration, and sharing of data such as the image data and surveillance and reconnaissance data. This paper presents three contiguous results. First, it briefly presents the new IPv6 capabilities; second, it presents a brief analysis of the security vulnerabilities arising from these capabilities; and third, it presents a new security model for IPv6 network infrastructures that has the potential to mitigate these vulnerabilities. The new model is based on the end-to-end connectivity that is restored in IPv6, thus allowing the use of host based security (HBS) systems together with the perimeter security devices. However, the use of HBS complicates the security trust management. Therefore the third component of the model is introduced, namely a policy based security management (PBSM) approach. The PBSM approach allows the secure deployment of the host based security systems. It provides the capabilities needed to --specify the trust zones via a set of security policy rules that together specify a trust zone. Hosts belong to one or more trust zones. Accordingly, the host based security policies are derived from the zone security policies for all the zones to which a host belongs. In addition, the PBSM approach has the potential to support more sophisticated security capabilities such as a risk adaptive access control and dynamic security response to a changing operational picture. The capabilities are needed to enable net-centric security operations.
机译:国防部(DoD)的全球信息网格(GIG)和国土安全部的OneNet等国家的网络基础设施正在按照2003年6月的国防部CIO备忘录过渡到Internet协议版本6(IPv6)。管理和预算办公室备忘录OMB-05-22。这些网络基础结构中存在IPv6特定的安全漏洞,需要减轻这些漏洞,以实现与现有IPv4操作的安全对等。从国土安全技术的角度来看,其他安全漏洞的存在意味着可能会面临两种威胁。首先,IPv6特定漏洞降低了网络基础架构本身的安全状态;其次,其他依赖IPv6的关键基础架构部门也需要额外的保护。例如,未来的监督控制和数据采集(SCADA)工业功能将越来越多地使用IPv6基础结构,语音通信,语音和视频协作以及诸如图像数据,监视和侦察数据之类的数据共享也将越来越多地使用IPv6基础结构。本文提出了三个连续的结果。首先,它简要介绍了新的IPv6功能。其次,对由这些功能引起的安全漏洞进行了简要分析;第三,它为IPv6网络基础设施提出了一种新的安全模型,可以减轻这些漏洞。新模型基于在IPv6中恢复的端到端连接,因此允许将基于主机的安全(HBS)系统与外围安全设备一起使用。但是,使用HBS会使安全信任管理变得复杂。因此,引入了模型的第三部分,即基于策略的安全管理(PBSM)方法。 PBSM方法允许安全部署基于主机的安全系统。它提供以下功能所需的功能- -- 通过一组安全策略规则来指定信任区,这些规则共同指定了一个信任区。主机属于一个或多个信任区域。因此,基于主机的安全策略是从主机所属的所有区域的区域安全策略中得出的。此外,PBSM方法有潜力支持更复杂的安全功能,例如风险自适应访问控制和对不断变化的运营状况的动态安全响应。需要这些功能以启用以网络为中心的安全操作。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号