Cargando…
Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic
The ubiquitous cloud computing services provide a new paradigm to the work-from-home environment adopted by the enterprise in the unprecedented crisis of the COVID-19 outbreak. However, the change in work culture would also increase the chances of the cybersecurity attack, MAC spoofing attack, and D...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Ohmsha
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8239485/ https://www.ncbi.nlm.nih.gov/pubmed/34219861 http://dx.doi.org/10.1007/s00354-021-00130-6 |
_version_ | 1783715088358703104 |
---|---|
author | Mandal, Sudakshina Khan, Danish Ali Jain, Sarika |
author_facet | Mandal, Sudakshina Khan, Danish Ali Jain, Sarika |
author_sort | Mandal, Sudakshina |
collection | PubMed |
description | The ubiquitous cloud computing services provide a new paradigm to the work-from-home environment adopted by the enterprise in the unprecedented crisis of the COVID-19 outbreak. However, the change in work culture would also increase the chances of the cybersecurity attack, MAC spoofing attack, and DDoS/DoS attack due to the divergent incoming traffic from the untrusted network for accessing the enterprise’s resources. Networks are usually unable to detect spoofing if the intruder already forges the host’s MAC address. However, the techniques used in the existing researches mistakenly classify the malicious host as the legitimate one. This paper proposes a novel access control policy based on a zero-trust network by explicitly restricting the incoming network traffic to substantiate MAC spoofing attacks in the software-defined network (SDN) paradigm of cloud computing. The multiplicative increase and additive decrease algorithm helps to detect the advanced MAC spoofing attack before penetrating the SDN-based cloud resources. Based on the proposed approach, a dynamic threshold is assigned to the incoming port number. The self-learning feature of the threshold stamping helps to rectify a legitimate user’s traffic before classifying it to the attacker. Finally, the mathematical and experimental results exhibit high accuracy and detection rate than the existing methodologies. The novelty of this approach strengthens the security of the SDN paradigm of cloud resources by redefining conventional access control policy. |
format | Online Article Text |
id | pubmed-8239485 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Ohmsha |
record_format | MEDLINE/PubMed |
spelling | pubmed-82394852021-06-29 Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic Mandal, Sudakshina Khan, Danish Ali Jain, Sarika New Gener Comput Article The ubiquitous cloud computing services provide a new paradigm to the work-from-home environment adopted by the enterprise in the unprecedented crisis of the COVID-19 outbreak. However, the change in work culture would also increase the chances of the cybersecurity attack, MAC spoofing attack, and DDoS/DoS attack due to the divergent incoming traffic from the untrusted network for accessing the enterprise’s resources. Networks are usually unable to detect spoofing if the intruder already forges the host’s MAC address. However, the techniques used in the existing researches mistakenly classify the malicious host as the legitimate one. This paper proposes a novel access control policy based on a zero-trust network by explicitly restricting the incoming network traffic to substantiate MAC spoofing attacks in the software-defined network (SDN) paradigm of cloud computing. The multiplicative increase and additive decrease algorithm helps to detect the advanced MAC spoofing attack before penetrating the SDN-based cloud resources. Based on the proposed approach, a dynamic threshold is assigned to the incoming port number. The self-learning feature of the threshold stamping helps to rectify a legitimate user’s traffic before classifying it to the attacker. Finally, the mathematical and experimental results exhibit high accuracy and detection rate than the existing methodologies. The novelty of this approach strengthens the security of the SDN paradigm of cloud resources by redefining conventional access control policy. Ohmsha 2021-06-29 2021 /pmc/articles/PMC8239485/ /pubmed/34219861 http://dx.doi.org/10.1007/s00354-021-00130-6 Text en © Ohmsha, Ltd. and Springer Japan KK, part of Springer Nature 2021 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Mandal, Sudakshina Khan, Danish Ali Jain, Sarika Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic |
title | Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic |
title_full | Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic |
title_fullStr | Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic |
title_full_unstemmed | Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic |
title_short | Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic |
title_sort | cloud-based zero trust access control policy: an approach to support work-from-home driven by covid-19 pandemic |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8239485/ https://www.ncbi.nlm.nih.gov/pubmed/34219861 http://dx.doi.org/10.1007/s00354-021-00130-6 |
work_keys_str_mv | AT mandalsudakshina cloudbasedzerotrustaccesscontrolpolicyanapproachtosupportworkfromhomedrivenbycovid19pandemic AT khandanishali cloudbasedzerotrustaccesscontrolpolicyanapproachtosupportworkfromhomedrivenbycovid19pandemic AT jainsarika cloudbasedzerotrustaccesscontrolpolicyanapproachtosupportworkfromhomedrivenbycovid19pandemic |