skip to main content
10.1145/3532105.3535029acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article
Public Access

Removing the Reliance on Perimeters for Security using Network Views

Published: 08 June 2022 Publication History

Abstract

Traditional enterprise security relies on network perimeters to define and enforce network security policies. Emerging application-focused Zero Trust architectures attempt to address this long-standing challenge by moving business applications to the cloud and performing enhanced identity and access control checks within a web gateway. However, these solutions ignore the security needs of workstations, development servers, and device management interfaces. In this work, we propose Network Views (abbrev. NetViews) for least-privilege network access control where each host has a different, limited view of the other hosts and services within a network. We present an SDN-based design and demonstrate that our implementation has network latency and throughput comparable to baseline reactive forwarding. We further provide an optimization for multi-connection flows that significantly reduces both redundant access control checks and forwarding state storage in switches. As such, NetViews provides a practical primitive for removing the reliance on security perimeters within enterprise networks.

Supplementary Material

MP4 File (FinalSACMAT2022.mp4)
While application-based Zero Trust architectures help enterprises secure their business applications by moving them to the cloud, they ignore the importance of securing the on-premises network environment that remains. This paper has introduced a novel paradigm for enterprise network security called Network Views where each host has a different ?view? of what other hosts and services exist in the network. This fine-grained least-privilege approach to network access control can significantly reduce lateral movement by attackers, even if user credentials have been compromised. NetViews builds on NIST?s Next Generation Access Control to pro- vide a dynamic and scalable policy model that supports the needs of large enterprises. We propose a multi-connection optimization that eliminates unnecessary first-packet latencies and significantly reduces TCAM requirements for SDN switches.
MP4 File (FinalSACMAT2022.mp4)
While application-based Zero Trust architectures help enterprises secure their business applications by moving them to the cloud, they ignore the importance of securing the on-premises network environment that remains. This paper has introduced a novel paradigm for enterprise network security called Network Views where each host has a different ?view? of what other hosts and services exist in the network. This fine-grained least-privilege approach to network access control can significantly reduce lateral movement by attackers, even if user credentials have been compromised. NetViews builds on NIST?s Next Generation Access Control to pro- vide a dynamic and scalable policy model that supports the needs of large enterprises. We propose a multi-connection optimization that eliminates unnecessary first-packet latencies and significantly reduces TCAM requirements for SDN switches.

References

[1]
R. A. Addad, D. L. C. Dutra, M. Bagaa, T. Taleb, H. Flinck, and M. Namane. 2018. Benchmarking the ONOS Intent Interfaces to Ease 5G Service Management. In Proceedings of the IEEE Global Communications Conference (GLOBECOM).
[2]
Iffat Anjum. 2021. Single Site Netviews. GitHub. https://github.com/netviews/ss-netviews.
[3]
Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter, and Munindar P. Singh. 2021. Role-Based Deception in Enterprise Networks. In Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY).
[4]
MITRE ATT&CK. 2019. NotPetya. https://attack.mitre.org/software/S0368/.
[5]
R. Basnet, S. Mukherjee, V. M. Pagadala, and I. Ray. 2018. An efficient implementation of next generation access control for the mobile health cloud. In Proceedings of the International Conference on Fog and Mobile Edge Computing (FMEC).
[6]
Noam Ben-Asher and Cleotilde Gonzalez. 2015. Effects of cyber security knowledge on attack detection. Computers in Human Behavior 48 (2015).
[7]
Pat Bosshart, Dan Daly, Glen Gibb, Martin Izzard, Nick McKeown, Jennifer Rexford, Cole Schlesinger, Dan Talayco, Amin Vahdat, George Varghese, and David Walker. 2014. P4: Programming Protocol-independent Packet Processors. ACM SIGCOMM Computer Communication Review 44, 3 (July 2014).
[8]
William Brockelsby and Rudra Dutta. 2021. Traffic Analysis in Support of Hybrid SDN Campus Architectures for Enhanced Cybersecurity. In Proceedings of the Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN).
[9]
BitWizard B.V. 1997. MTR. BitWizard. http://www.bitwizard.nl/mtr/.
[10]
Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, and Mingwei Xu. 2020. When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. In Proceedings of the Network and Distributed System Security Symposium (NDSS).
[11]
Martin Casado, Michael J. Freedman, Justin Pettit, Jianying Luo, Nick McKeown, and Scott Shenker. 2007. Ethane: Taking Control of the Enterprise. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM).
[12]
William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin. 2003. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Professional.
[13]
Department of Homehald Security CISA. 2017. Petya Ransomware. Alert (TA17--181A). https://us-cert.cisa.gov/ncas/alerts/TA17--181A.
[14]
E. Coyne and T. R. Weil. 2013. ABAC and RBAC: Scalable, Flexible, and Auditable Access Management. IT Professional 15, 03 (May 2013).
[15]
Jon Dugan, Seth Elliott, Bruce A. Mah, Jeff Poskanzer, and Kaustubh Prabhu. 2015. iPerf - The ultimate speed test tool for TCP, UDP and SCTP. https://iperf.fr/.
[16]
Seyed Kaveh Fayazbakhsh, Luis Chiang, Vyas Sekar, Minlan Yu, and Jeffrey C. Mogul. 2014. Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).
[17]
David Ferraiolo, Vijayalakshmi Atluri, and Serban Gavrila. 2011. The Policy Machine: A novel architecture and framework for access control policy specification and enforcement. JOURNAL of Systems Architecture 57, 4 (2011).
[18]
David Ferraiolo, Ramaswamy Chandramouli, Rick Kuhn, and Vincent Hu. 2016. Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC). In Proceedings of the ACM International Workshop on Attribute Based Access Control (ABAC).
[19]
David F Ferraiolo, Larry Feldman, and Gregory A Witte. 2016. Exploring the next generation of access control methodologies. NIST. https://www.nist.gov/publications/exploring-next-generation-access-control-methodologies.
[20]
FireEye. 2020. Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor. THREAT RESEARCH. https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html.
[21]
Nate Foster, Rob Harrison, Michael J. Freedman, Christopher Monsanto, Jennifer Rexford, Alec Story, and David Walker. 2011. Frenetic: A Network Programming Language. ACM SIGPLAN Notices 46, 9 (Sep. 2011).
[22]
Open Networking Foundation. 2018. Intent Framework. ONOS. https://wiki.onosproject.org/display/ONOS/Intent+Framework.
[23]
M. G. Gouda and X. . A. Liu. 2004. Firewall design: consistency, completeness, and compactness. In Proceedings of the International Conference on Distributed Computing Systems (ICDCS).
[24]
Sanket Goutam, William Enck, and Bradley Reaves. 2019. Hestia: Simple Least Privilege Network Policies for Smart Homes. In Proceedings of the Conference on Security and Privacy in Wireless and Mobile Networks (WiSec).
[25]
Stephen Gutz, Alec Story, Cole Schlesinger, and Nate Foster. 2012. Splendid Isolation: A Slice Abstraction for Software-Defined Networks. In Proceedings of the First Workshop on Hot Topics in Software Defined Networks (HotSDN).
[26]
Timothy L. Hinrichs, N. Gude, M. Casado, John C. Mitchell, and S. Shenker. 2009. Practical declarative network management. In Proceedings of the ACM Workshop on Research on Enterprise Networking (WREN).
[27]
Sungmin Hong, R. Baykov, Lei Xu, Srinath Nadimpalli, and G. Gu. 2016. Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security. In Proceedings of the Network and Distributed System Security Symposium (NDSS).
[28]
V. C. Hu, D. R. Kuhn, D. F. Ferraiolo, and J. Voas. 2015. Attribute-Based Access Control. Computer 48, 2 (Feb 2015).
[29]
Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi, Cristina Nita-Rotaru, and David Bigelow. 2017. Identifier Binding Attacks and Defenses in Software-Defined Networks. In Proceedings of the USENIX Security Symposium.
[30]
Akash Shah Joshua Roberts. 2019. Policy Machine Core. GitHub. https://github.com/PM-Master/policy-machine-core.
[31]
Jyh-Cheng Chen and Yu-Ping Wang. 2005. Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience. IEEE Communications Magazine 43, 12 (2005).
[32]
N. Kang, O. Rottenstreich, S. G. Rao, and J. Rexford. 2017. Alpaca: Compact Network Policies With Attribute-Encoded Addresses. IEEE/ACM Transactions on Networking 25, 3 (June 2017).
[33]
Charalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo, and Elisa Bertino. 2021. Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT).
[34]
Peyman Kazemian, George Varghese, and Nick McKeown. 2012. Header Space Analysis: Static Checking for Networks. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).
[35]
Hyojoon Kim, Joshua Reich, Arpit Gupta, Muhammad Shahbaz, Nick Feamster, and Russ Clark. 2015. Kinetic: Verifiable Dynamic Network Control. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).
[36]
Hyojoon Kim, A. Voellmy, Sam Burnett, N. Feamster, and R. Clark. 2012. Lithium: Event-Driven Network Control. Georgia Tech Library. https://smartech.gatech.edu/handle/1853/43377.
[37]
Shashi Kiran. 2015. Data-Center: Micro-segmentation: Enhancing Security and Operational Simplicity with Cisco ACI. CISCO. https://blogs.cisco.com/datacenter/microsegmentation.
[38]
Jonghoon Kwon, Taeho Lee, Claude Hahni, and Adrian Perrig. 2020. SVLAN: Secure & Scalable Network Virtualization. In Proceedings of the Network and Distributed System Security Symposium (NDSS).
[39]
Dan Levin, Marco Canini, Stefan Schmid, Fabian Schaffert, and Anja Feldmann. 2014. Panopticon: Reaping the Benefits of Incremental SDN Deployment in Enterprise Networks. In Proceedings of the USENIX Annual Technical Conference.
[40]
Richard Lippmann, Kyle Ingols, Chris Scott, Keith Piwowarski, Kendra Kratkiewicz, Mike Artz, and Robert Cunningham. 2006. Validating and Restoring Defense in Depth Using Attack Graphs. In Proceedings of the IEEE Military Communications conference (MILCOM).
[41]
A. Mayer, A. Wool, and E. Ziskind. 2000. Fang: a firewall analysis engine. In Proceedings of the IEEE Symposium on Security and Privacy (S&P).
[42]
Nick McKeown, Tom Anderson, Hari Balakrishnan, Guru Parulkar, Larry Peterson, Jennifer Rexford, Scott Shenker, and Jonathan Turner. 2008. OpenFlow: Enabling Innovation in Campus Networks. SIGCOMM Comput. Commun. Rev. 38, 2 (April 2008).
[43]
Peter Mell, James M. Shook, and Serban Gavrila. 2016. Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems. In Proceedings of the ACM CCS International Workshop on Managing Insider Security Threats (MIST).
[44]
Microsoft 365 Defender Research Team. 2020. Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers. Microsoft Threat Intelligence Center (MSTIC). https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/.
[45]
Christopher Monsanto, Nate Foster, Rob Harrison, and David P. Walker. 2012. A compiler and run-time system for network programming languages. In Proceedings of the Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL).
[46]
Christopher Monsanto, Joshua Reich, Nate Foster, Jennifer Rexford, and David Walker. 2013. Composing Software-Defined Networks. In USENIX Symposium on Networked Systems Design and Implementation (NSDI).
[47]
A. Moubayed, A. Refaey, and A. Shami. 2019. Software-Defined Perimeter (SDP): State of the Art Secure Solution for Modern Networks. IEEE Network 33, 5 (Sep. 2019).
[48]
Muhammad Mujib and Riri Fitri Sari. 2020. Design of implementation of a zero trust approach to network micro-segmentation. International JOURNAL of Advanced Science and Technology 29, 7 (apr 2020).
[49]
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, and Russ Clark. 2009. Resonance: Dynamic Access Control for Enterprise Networks. In Proceedings of the ACM Workshop on Research on Enterprise Networking (WREN).
[50]
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, and Russ Clark. 2009. Resonance: Dynamic Access Control for Enterprise Networks. In Proceedings of the ACM Workshop on Research on Enterprise Networking (WREN).
[51]
Netviews2022. 2021. Netviews Online Appendix. https://gist.github.com/Netviews2022/67d5265a19039e4f8c4d1733f0c02751.
[52]
K. Neupane, R. Haddad, and L. Chen. 2018. Next Generation Firewall for Network Security: A Survey. In Proceedings of the SoutheastCon (SECON).
[53]
David M. Nicol and Vikas Mallapura. 2014. Modeling and analysis of stepping stone attacks. In Proceedings of the Winter Simulation Conference (WSC).
[54]
Tj OConnor, William Enck, W. Michael Petullo, and Akash Verma. 2018. PivotWall: SDN-Based Information Flow Control. In Proceedings of the Symposium on SDN Research (SOSR).
[55]
Executive Office of the President. 2022. Moving the U.S. Government Toward Zero Trust Cybersecurity Principles. Memorandum. https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf.
[56]
Zafar Ayyub Qazi, Cheng-Chun Tu, Luis Chiang, Rui Miao, Vyas Sekar, and Minlan Yu. 2013. SIMPLE-fying Middlebox Policy Enforcement Using SDN. In Proceedings of the ACM SIGCOMM (SIGCOMM).
[57]
Scott Rose, Oliver Borchert, Stu Mitchell, and Sean Connelly. 2019. Zero trust architecture. National Institute of Standards and Technology. https://csrc.nist.gov/publications/detail/sp/800--207/final.
[58]
Ravi Sandhu. 1996. Roles versus Groups. In Proceedings of the ACM Workshop on Role-Based Access Control (RBAC).
[59]
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. 1996. Role-based access control models. Computer 29, 2 (1996).
[60]
F. B. Schneider. 2003. Least privilege and more [computer security]. IEEE Security & Privacy 1, 5 (2003).
[61]
Rob Sherwood, Michael Chan, Adam Covington, Glen Gibb, Mario Flajslik, Nikhil Handigol, Te-Yuan Huang, Peyman Kazemian, Masayoshi Kobayashi, Jad Naous, and et al. 2010. Carving Research Slices out of Your Production Networks with OpenFlow. SIGCOMM Comput. Commun. Rev. 40, 1 (Jan. 2010).
[62]
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J.M. Wing. 2002. Automated generation and analysis of attack graphs. In Proceedings of the IEEE Symposium on Security and Privacy (S&P).
[63]
K. Sripanidkulchai, C. Issariyapat, and K. Meesublak. 2008. Inference of network-wide VLAN usage in small enterprise networks. In Proceedings of the IEEE INFOCOM Workshops.
[64]
R. Talpade, G. Kim, and S. Khurana. 1999. NOMAD: traffic-based network monitoring framework for anomaly detection. In Proceedings of the IEEE International Symposium on Computers and Communications.
[65]
Mininet Team. 2018. Mininet An Instant Virtual Network on your Laptop (or other PC). http://mininet.org/.
[66]
Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, and Stefan Schmid. 2016. Reigns to the Cloud: Compromising Cloud Systems via the Data Plane. CoRR abs/1610.08717 (2016).
[67]
Dan Thomsen and Elisa Bertino. 2018. Network Policy Enforcement Using Transactions: The NEUTRON Approach. In Proceedings of the ACM on Symposium on Access Control Models and Technologies (SACMAT).
[68]
Rory Ward and Betsy Beyer. 2014. BeyondCorp: A New Approach to Enterprise Security. ;login: 39, 6 (2014).
[69]
A. Wool. 2004. A quantitative study of firewall configuration errors. Computer 37, 6 (2004).
[70]
Changhoon Yoon, Taejune Park, Seungsoo Lee, Heedo Kang, Seungwon Shin, and Zonghua Zhang. 2015. Enabling security functions with SDN: A feasibility study. Computer Networks 85 (2015).
[71]
Tianlong Yu, Seyed Fayaz, Michael Collins, Vyas Sekar, and Srinivasan Seshan. 2017. PSI: Precise Security Instrumentation for Enterprise Networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS).
[72]
Menghao Zhang, G. Li, Shicheng Wang, Chang Liu, Ang Chen, H. Hu, G. Gu, Q. Li, M. Xu, and Jianping Wu. 2020. Poseidon: Mitigating VOLUMEtric DDoS Attacks with Programmable Switches. In Proceedings of the Network and Distributed System Security Symposium (NDSS).
[73]
Menghao Zhang, Guanyu Li, Lei Xu, Jun Bi, Guofei Gu, and Jiasong Bai. 2018. Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures. In Proceedings of the Research in Attacks, Intrusions, and Defenses.

Cited By

View all
  • (2025)ZT-SDN: An ML-Powered Zero-Trust Architecture for Software-Defined NetworksACM Transactions on Privacy and Security10.1145/371226228:2(1-35)Online publication date: 15-Jan-2025
  • (2024)IMPROVEMENT THE SECURITY OF THE ENTERPRISE’S NETWORK INFRASTRUCTURE IN CONDITIONS OF MODERN CHALLENGES AND LIMITED RESOURCESComputer systems and network10.23939/csn2024.01.1556:1(155-164)Online publication date: Jun-2024
  • (2024)Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based NetworkingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670301(3630-3644)Online publication date: 2-Dec-2024
  • Show More Cited By

Index Terms

  1. Removing the Reliance on Perimeters for Security using Network Views

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SACMAT '22: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies
      June 2022
      282 pages
      ISBN:9781450393577
      DOI:10.1145/3532105
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 June 2022

      Permissions

      Request permissions for this article.

      Check for updates

      Badges

      • Best Student Paper

      Author Tags

      1. enterprise network security
      2. least-privilege
      3. software-defined networking
      4. zero trust architectures

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      SACMAT '22
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 177 of 597 submissions, 30%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)278
      • Downloads (Last 6 weeks)54
      Reflects downloads up to 27 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)ZT-SDN: An ML-Powered Zero-Trust Architecture for Software-Defined NetworksACM Transactions on Privacy and Security10.1145/371226228:2(1-35)Online publication date: 15-Jan-2025
      • (2024)IMPROVEMENT THE SECURITY OF THE ENTERPRISE’S NETWORK INFRASTRUCTURE IN CONDITIONS OF MODERN CHALLENGES AND LIMITED RESOURCESComputer systems and network10.23939/csn2024.01.1556:1(155-164)Online publication date: Jun-2024
      • (2024)Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based NetworkingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670301(3630-3644)Online publication date: 2-Dec-2024
      • (2024)Security Challenges of Intent-Based NetworkingCommunications of the ACM10.1145/363970267:7(56-65)Online publication date: 2-Jul-2024
      • (2024)A Survey on Zero Trust Architecture: Applications and Challenges of 6G NetworksIEEE Access10.1109/ACCESS.2024.342535012(94753-94764)Online publication date: 2024
      • (2023)MSNetViews: Geographically Distributed Management of Enterprise Network Security PolicyProceedings of the 28th ACM Symposium on Access Control Models and Technologies10.1145/3589608.3593836(121-132)Online publication date: 24-May-2023

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media