30.07.2015 Views

Proceedings in pdf format. - Sociotechnical Systems Engineering ...

Proceedings in pdf format. - Sociotechnical Systems Engineering ...

Proceedings in pdf format. - Sociotechnical Systems Engineering ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NECESSITY OF NEW LAYERED APPROACH TO NETWORK SECURITYDmitry KryukovRiga Technical UniversityE-mail dmitrijs.krjukovs@riga.lvKEYWORDSLayered approach, network security, security model.ABSTRACTSecurity solutions for networks typically appear ass<strong>in</strong>gle products or protocols that correspond to a s<strong>in</strong>gle orfew layers of the OSI network reference model (protocolstack). The result is a wide variety of protocols andproducts, which provide solutions to very specificproblems and environments.In this paper, defense-<strong>in</strong>-depth strategy is analyzedand it’s <strong>in</strong>troduced the need for layered architecture forsecure networks. Adoption of a layered approach leads tomany advantages <strong>in</strong> secure network design: modularity,flexibility, ease of standardization, etc.INTRODUCTIONSystem and network security is a key technology tothe development and wide deployment of applicationsand services <strong>in</strong> the <strong>in</strong><strong>format</strong>ion society. Security ismission critical at various levels: comput<strong>in</strong>g systems(servers and clients), network, and applications.Although network security is a critical requirement <strong>in</strong>emerg<strong>in</strong>g networks, there is a significant lack ofmethodologies that def<strong>in</strong>e easy-to-adopt rules and stepsto build secure networks.NETWORK DESIGNNetwork design is a well-understood process, despitethe arguments for and aga<strong>in</strong>st the various protocols andapproaches. There are many approaches to securenetworks, such as proposed by Cisco (Cisco 2005),Nortel (White Paper 2006) and others which describehow to raise level of security us<strong>in</strong>g some technologiesand products <strong>in</strong> comb<strong>in</strong>ation with secure architecture.Some of approaches concentrate mostly on networkarchitecture issues from telecommunications perspective,some have offset to IT solutions. But the th<strong>in</strong>g thatmajority of approaches have <strong>in</strong> common – they mostlyare based on some ISO Open <strong>Systems</strong> Interconnect (OSI)Reference model’s layer harden<strong>in</strong>g and their serviceprovision is based mostly on their own products.Mostly all approaches have commercial nature anduse brand and <strong>in</strong> some cases proprietary solutions such asspecific protocols and appliances. Such approach tonetwork security leads to situation when it consideredthat secure network is noth<strong>in</strong>g more than securearchitecture and management plus up-to-date andcarefully patched software.NETWORK SECURITY ARCHITECTURESERVICESVarious forms of security-enhanc<strong>in</strong>g technologieshave received research attention. Security hastraditionally been def<strong>in</strong>ed <strong>in</strong> terms of the threecornerstones of security: confidentiality, <strong>in</strong>tegrity, andavailability. While confidentiality has been the focus ofprevious technical solutions, it is the balance between allthree dimensions that is required. Neglect<strong>in</strong>g to addresseither one of the cornerstones will result <strong>in</strong> <strong>in</strong>adequatesecurity. On the other hand, a state of security assurancecan be achieved if all of the cornerstones have beenaddressed. In addition to confidentiality, <strong>in</strong>tegrity, andavailability, ISO 7498-2 identifies a range of types ofsecurity services and mechanisms. The standard def<strong>in</strong>esfive security services:• Confidentiality: <strong>in</strong><strong>format</strong>ion will be keptsecret, with access limited to appropriatepersons;• Integrity: <strong>in</strong><strong>format</strong>ion will not be accidentallyor maliciously altered or destroyed;• Authentication: identity verification of anyentity;• Non-repudiation: communicat<strong>in</strong>g peer cannotdeny (later) participation <strong>in</strong> a communicationexchange;• Authorization and Availability: assur<strong>in</strong>g<strong>in</strong><strong>format</strong>ion and communication services will beready for use for authorized parties whenexpected.The standard thus adds the dimension of accesscontrol as well as the notion of non-repudiation.Access control has always received ample <strong>in</strong>terest <strong>in</strong> thesecurity doma<strong>in</strong>. Non-repudiation has becomeAnnual <strong>Proceed<strong>in</strong>gs</strong> of Vidzeme University College “ICTE <strong>in</strong> Regional Development”, 2006127

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!