Protection of Network Security Selector Secrecy in Outsourced Network Testing

S Alasmari, W Wang, A Lu… - 2023 32nd International …, 2023 - ieeexplore.ieee.org
2023 32nd International Conference on Computer Communications and …, 2023ieeexplore.ieee.org
With the emergence and fast development of cloud computing and outsourced services,
more and more companies start to use managed security service providers (MSSP) as their
security service team. This approach can save the budget on maintaining its own security
teams and depend on professional security persons to protect the company infrastructures
and intellectual property. However, this approach also gives the MSSP opportunities to
honor only a part of the security service level agreement. To prevent this from happening …
With the emergence and fast development of cloud computing and outsourced services, more and more companies start to use managed security service providers (MSSP) as their security service team. This approach can save the budget on maintaining its own security teams and depend on professional security persons to protect the company infrastructures and intellectual property. However, this approach also gives the MSSP opportunities to honor only a part of the security service level agreement. To prevent this from happening, researchers propose to use outsourced network testing to verify the execution of the security policies. During this procedure, the end customer has to design network testing traffic and provide it to the testers. Since the testing traffic is designed based on the security rules and selectors, external testers could derive the customer network security setup, and conduct subsequent attacks based on the learned knowledge. To protect the network security configuration secrecy in outsourced testing, in this paper we propose different methods to hide the accurate information. For Regex-based security selectors, we propose to introduce fake testing traffic to confuse the testers. For exact match and range based selectors, we propose to use NAT VM to hide the accurate information. We conduct simulation to show the protection effectiveness under different scenarios. We also discuss the advantages of our approaches and the potential challenges.
ieeexplore.ieee.org
Showing the best result for this search. See all results