{"title":"零信任使用网络微分段","authors":"Nabeela I. Sheikh, M. Pawar, Victor Lawrence","doi":"10.1109/INFOCOMWKSHPS51825.2021.9484645","DOIUrl":null,"url":null,"abstract":"Current enterprise infrastructures are undergoing significant security transformations as traditional infrastructures and data centers are being replaced by cloud computing environments hosting dynamic workloads. Current network security best practices are not well suited for traditional data centers where network micro segmentation is required. In this paper, we present a novel network security architecture that supports zero trust approach, based on a concept that inspects network traffic for port and protocol information to allow authorized communication. This approach is demonstrated in a cloud computing data center environment.","PeriodicalId":109588,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Zero trust using Network Micro Segmentation\",\"authors\":\"Nabeela I. Sheikh, M. Pawar, Victor Lawrence\",\"doi\":\"10.1109/INFOCOMWKSHPS51825.2021.9484645\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Current enterprise infrastructures are undergoing significant security transformations as traditional infrastructures and data centers are being replaced by cloud computing environments hosting dynamic workloads. Current network security best practices are not well suited for traditional data centers where network micro segmentation is required. In this paper, we present a novel network security architecture that supports zero trust approach, based on a concept that inspects network traffic for port and protocol information to allow authorized communication. This approach is demonstrated in a cloud computing data center environment.\",\"PeriodicalId\":109588,\"journal\":{\"name\":\"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-05-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484645\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484645","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Current enterprise infrastructures are undergoing significant security transformations as traditional infrastructures and data centers are being replaced by cloud computing environments hosting dynamic workloads. Current network security best practices are not well suited for traditional data centers where network micro segmentation is required. In this paper, we present a novel network security architecture that supports zero trust approach, based on a concept that inspects network traffic for port and protocol information to allow authorized communication. This approach is demonstrated in a cloud computing data center environment.