User trust measurement method in zero-trust SDN network

A measurement method and technology of trust degree, applied in the field of virtual network, can solve problems such as attack damage and lack of credibility

Inactive Publication Date: 2021-04-30
积至(海南)信息技术有限公司
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The zero-trust security model assumes that attackers may appear on the internal network of the enterprise. The internal network infrastructure of the enterprise faces the same security threats as other external networks, and is also vulnerable to attacks and damages. It does not have higher credibility.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User trust measurement method in zero-trust SDN network
  • User trust measurement method in zero-trust SDN network
  • User trust measurement method in zero-trust SDN network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0034]The method for measuring user trust in a zero-trust SDN network provided by the present invention adopts systematic and fine-grained access control in the SDN network, and designs a control mechanism for network resource access based on the main idea of ​​a zero-trust security architecture. A zero-trust access control method based on user behavior zero-trust metric is proposed revolutionaryly, a zero-trust decision-making entity is placed in the SDN network control plane...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses a user trust measurement method in a zero-trust SDN network, which adopts systematic and fine-grained access control in the SDN network, designs a control mechanism of network resource access based on the main thought of a zero-trust security architecture, innovatively proposes an access control method based on a user behavior zero-trust measurement value, arranges a zero-trust decision entity in an SDN network control plane, carries out intelligent and refined access control on each access behavior of a user, and realizes resource security protection in a virtual network. The user trust measurement method has very important significance in digital transformation of enterprises and governments in the future.

Description

technical field [0001] The invention relates to the technical field of virtual networks, and in particular relates to a method for measuring user trust in a zero-trust SDN network. Background technique [0002] With the gradual maturity and improvement of virtualization standards, rapid network deployment and flexible adjustment become possible, and NFV (Network Function Virtualization, Network Function Virtualization) technology emerges as the times require. NFV uses virtualization technology to provide a new method for designing, deploying and managing network services. The main idea of ​​NFV is to decouple the physical network device and the network function running on it, which means that a network function (such as a firewall) can be regarded as an instance of ordinary software. This makes it possible to consolidate a large number of network devices into high-capacity servers. For a given service, it can be decomposed into multiple virtual network function VNFs (Virtu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24
CPCH04L41/00
Inventor 张微郑超卢文朋黄园园
Owner 积至(海南)信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products