2014 Third European Workshop on Software Defined Networks 2014
DOI: 10.1109/ewsdn.2014.39
|View full text |Cite
|
Sign up to set email alerts
|

FlowNAC: Flow-based Network Access Control

Abstract: This paper presents FlowNAC, a Flow-based Network Access Control solution that allows to grant users the rights to access the network depending on the target service requested. Each service, defined univocally as a set of flows, can be independently requested and multiple services can be authorized simultaneously. Building this proposal over SDN principles has several benefits: SDN adds the appropriate granularity (fine-or coarse-grained) depending on the target scenario and flexibility to dynamically identify… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(21 citation statements)
references
References 5 publications
(5 reference statements)
0
21
0
Order By: Relevance
“…Most take advantage of SDN for improving services required to secure systems and networks, such as policy enforcement (e.g., access control, firewalling, middleboxes as middlepipes [27]) [100], [326], [335], [324], [27], DoS attacks detection and mitigation [323], [334], random host mutation [324] (i.e., randomly and frequently mutate the IP addresses of end-hosts to break the attackers' assumption about static IPs, which is the common case) [329], monitoring of cloud infrastructures for finegrained security inspections (i.e., automatically analyze and detour suspected traffic to be further inspected by specialized network security appliances, such as deep packet inspection systems) [321], traffic anomaly detection [352], [323], [334], fine-grained flow-based network access control [325], fine-grained policy enforcement for personal mobile applica-tions [327] and so forth [100], [326], [323], [329], [321], [324], [335], [352]. Others address OpenFlow-based networks issues, such as flow rule prioritization, security services composition, protection against traffic overload, and protection against malicious administrators [201], [258], [320], [328], [199].…”
Section: Security and Dependabilitymentioning
confidence: 99%
“…Most take advantage of SDN for improving services required to secure systems and networks, such as policy enforcement (e.g., access control, firewalling, middleboxes as middlepipes [27]) [100], [326], [335], [324], [27], DoS attacks detection and mitigation [323], [334], random host mutation [324] (i.e., randomly and frequently mutate the IP addresses of end-hosts to break the attackers' assumption about static IPs, which is the common case) [329], monitoring of cloud infrastructures for finegrained security inspections (i.e., automatically analyze and detour suspected traffic to be further inspected by specialized network security appliances, such as deep packet inspection systems) [321], traffic anomaly detection [352], [323], [334], fine-grained flow-based network access control [325], fine-grained policy enforcement for personal mobile applica-tions [327] and so forth [100], [326], [323], [329], [321], [324], [335], [352]. Others address OpenFlow-based networks issues, such as flow rule prioritization, security services composition, protection against traffic overload, and protection against malicious administrators [201], [258], [320], [328], [199].…”
Section: Security and Dependabilitymentioning
confidence: 99%
“…OpenFlow-based framework named OpenSec, which helps maintain pre-defined security policies, i.e., guiding how it responds when malicious events are identified. Matias et al [26] designed FlowNAC to authenticate participants and service-level access control according to the flow status. • DoS defend.…”
Section: Defence and Solutionsmentioning
confidence: 99%
“…General SDN Security. Various security issues related to the SDN have been studied previously [1,[31][32][33][34]. Kreutz et al [6] presented new threat vectors of the SDN that were not present in traditional networks.…”
Section: Related Workmentioning
confidence: 99%