Cargando…

Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic

The ubiquitous cloud computing services provide a new paradigm to the work-from-home environment adopted by the enterprise in the unprecedented crisis of the COVID-19 outbreak. However, the change in work culture would also increase the chances of the cybersecurity attack, MAC spoofing attack, and D...

Descripción completa

Detalles Bibliográficos
Autores principales: Mandal, Sudakshina, Khan, Danish Ali, Jain, Sarika
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Ohmsha 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8239485/
https://www.ncbi.nlm.nih.gov/pubmed/34219861
http://dx.doi.org/10.1007/s00354-021-00130-6
_version_ 1783715088358703104
author Mandal, Sudakshina
Khan, Danish Ali
Jain, Sarika
author_facet Mandal, Sudakshina
Khan, Danish Ali
Jain, Sarika
author_sort Mandal, Sudakshina
collection PubMed
description The ubiquitous cloud computing services provide a new paradigm to the work-from-home environment adopted by the enterprise in the unprecedented crisis of the COVID-19 outbreak. However, the change in work culture would also increase the chances of the cybersecurity attack, MAC spoofing attack, and DDoS/DoS attack due to the divergent incoming traffic from the untrusted network for accessing the enterprise’s resources. Networks are usually unable to detect spoofing if the intruder already forges the host’s MAC address. However, the techniques used in the existing researches mistakenly classify the malicious host as the legitimate one. This paper proposes a novel access control policy based on a zero-trust network by explicitly restricting the incoming network traffic to substantiate MAC spoofing attacks in the software-defined network (SDN) paradigm of cloud computing. The multiplicative increase and additive decrease algorithm helps to detect the advanced MAC spoofing attack before penetrating the SDN-based cloud resources. Based on the proposed approach, a dynamic threshold is assigned to the incoming port number. The self-learning feature of the threshold stamping helps to rectify a legitimate user’s traffic before classifying it to the attacker. Finally, the mathematical and experimental results exhibit high accuracy and detection rate than the existing methodologies. The novelty of this approach strengthens the security of the SDN paradigm of cloud resources by redefining conventional access control policy.
format Online
Article
Text
id pubmed-8239485
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Ohmsha
record_format MEDLINE/PubMed
spelling pubmed-82394852021-06-29 Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic Mandal, Sudakshina Khan, Danish Ali Jain, Sarika New Gener Comput Article The ubiquitous cloud computing services provide a new paradigm to the work-from-home environment adopted by the enterprise in the unprecedented crisis of the COVID-19 outbreak. However, the change in work culture would also increase the chances of the cybersecurity attack, MAC spoofing attack, and DDoS/DoS attack due to the divergent incoming traffic from the untrusted network for accessing the enterprise’s resources. Networks are usually unable to detect spoofing if the intruder already forges the host’s MAC address. However, the techniques used in the existing researches mistakenly classify the malicious host as the legitimate one. This paper proposes a novel access control policy based on a zero-trust network by explicitly restricting the incoming network traffic to substantiate MAC spoofing attacks in the software-defined network (SDN) paradigm of cloud computing. The multiplicative increase and additive decrease algorithm helps to detect the advanced MAC spoofing attack before penetrating the SDN-based cloud resources. Based on the proposed approach, a dynamic threshold is assigned to the incoming port number. The self-learning feature of the threshold stamping helps to rectify a legitimate user’s traffic before classifying it to the attacker. Finally, the mathematical and experimental results exhibit high accuracy and detection rate than the existing methodologies. The novelty of this approach strengthens the security of the SDN paradigm of cloud resources by redefining conventional access control policy. Ohmsha 2021-06-29 2021 /pmc/articles/PMC8239485/ /pubmed/34219861 http://dx.doi.org/10.1007/s00354-021-00130-6 Text en © Ohmsha, Ltd. and Springer Japan KK, part of Springer Nature 2021 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Mandal, Sudakshina
Khan, Danish Ali
Jain, Sarika
Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic
title Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic
title_full Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic
title_fullStr Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic
title_full_unstemmed Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic
title_short Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic
title_sort cloud-based zero trust access control policy: an approach to support work-from-home driven by covid-19 pandemic
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8239485/
https://www.ncbi.nlm.nih.gov/pubmed/34219861
http://dx.doi.org/10.1007/s00354-021-00130-6
work_keys_str_mv AT mandalsudakshina cloudbasedzerotrustaccesscontrolpolicyanapproachtosupportworkfromhomedrivenbycovid19pandemic
AT khandanishali cloudbasedzerotrustaccesscontrolpolicyanapproachtosupportworkfromhomedrivenbycovid19pandemic
AT jainsarika cloudbasedzerotrustaccesscontrolpolicyanapproachtosupportworkfromhomedrivenbycovid19pandemic