零信任网络及其关键技术综述

被引:23
作者
王群 [1 ]
袁泉 [2 ]
李馥娟 [1 ]
夏玲玲 [1 ]
机构
[1] 江苏警官学院计算机信息与网络安全系
[2] 中国药科大学图书与信息中心
关键词
零信任; 网络安全; 安全模型; 自动化系统; 微隔离;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
在网络安全威胁日趋严峻、安全防御手段日益复杂的情况下,零信任网络能够对传统边界安全架构进行全新的评估和审视。零信任强调不要永远信任,而且要持续验证,而零信任网络不以位置标识身份,所有访问控制严格执行最小权限,所有访问过程被实时跟踪和动态评估。首先,给出了零信任网络的基本定义,指出了传统边界安全暴露出的主要问题,并描述了零信任网络模型;其次,分析了软件定义边界(SDP)、身份和访问管理、微隔离、自动配置管理系统(ACMS)等零信任网络中的关键技术;最后,对零信任网络进行了总结,并展望未来发展。
引用
收藏
页码:1142 / 1150
页数:9
相关论文
共 17 条
[1]  
零信任网络.[M].埃文·吉尔曼;道格·巴斯.人民邮电出版社.2019,
[2]   Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN [J].
Ramezanpour, Keyvan ;
Jagannath, Jithin .
COMPUTER NETWORKS, 2022, 217
[3]   The case for Zero Trust Digital Forensics [J].
Neale, Christopher ;
Kennedy, Ian ;
Price, Blaine ;
Yu, Yijun ;
Nuseibeh, Bashar .
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2022, 40
[4]   LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA) [J].
Shah, Syed W. ;
Syed, Naeem F. ;
Shaghaghi, Arash ;
Anwar, Adnan ;
Baig, Zubair ;
Doss, Robin .
COMPUTERS & SECURITY, 2021, 108
[5]  
DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges.[J].Eliyan Lubna Fayez;Di Pietro Roberto.Future Generation Computer Systems.2021, prepublish
[6]  
Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms.[J].R. Simpson William;E. Foltz Kevin.International Journal of Network Security & Its Applications.2021, 1
[7]   Access Control Role Evolution Mechanism for Open Computing Environment [J].
Liu, Aodi ;
Du, Xuehui ;
Wang, Na .
ELECTRONICS, 2020, 9 (03)
[8]   A Survey on Intent-Driven Networks [J].
Pang, Lei ;
Yang, Chungang ;
Chen, Danyang ;
Song, Yanbo ;
Guizani, Mohsen .
IEEE ACCESS, 2020, 8 :22862-22873
[9]   Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries [J].
Sancho, Jorge ;
Garcia, Jose ;
Alesanco, Alvaro .
SECURITY AND COMMUNICATION NETWORKS, 2020, 2020 (2020)
[10]   SoftSwitch: a centralized honeypot-based security approach using software-defined switching for secure management of VLAN networks [J].
Baykara, Muhammet ;
Das, Resul .
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (05) :3309-3325