Title :
Identity-Based Internet Protocol Networking
Author :
Nakamoto, G. ; Durst, R. ; Growney, C. ; Andresen, J. ; Ma, Jiaxin ; Trivedi, N. ; Quang, R. ; Pisano, D.
Author_Institution :
MITRE Corp., McLean, VA, USA
fDate :
Oct. 29 2012-Nov. 1 2012
Abstract :
The Identity-Based Internet Protocol (IBIP) Network project is experimenting with a new enterprise oriented network architecture using standard Internet Protocol to encode identity (ID) information into the IP packet by a new edge security device referred to as the IBIP policy enforcement point (PEP). This is a variant of a network admission control process that establishes user and host identities as well as provides optional information on host visibility, organizational affiliation, current role, and trust metric (associated with the user and host endpoints). Our motivation is to increase our security posture by leveraging identity, reducing our threat exposure, enhancing situational understanding of our environment, and simplifying network operations. In addition to authentication, we leverage strong anti-spoofing technology to improve accountability. We reduce our threat surface by “hiding” our client hosts and making all infrastructure devices inaccessible. Any attempt to access a hidden host or infrastructure device results in a policy violation attributable to the user/host that caused the violation and provides enhanced situational awareness of such activities. Our servers can also have a “permissible use” policy that ensures that the server only operates across the network per that policy. Finally, as users log in and servers are added to the network all dynamic configurations for access control initiated by such changes are automatically carried out without manual intervention, thereby reducing potential vulnerabilities caused by human errors.
Keywords :
Internet; authorisation; computer network security; transport protocols; IBIP policy enforcement point; IP packet; PEP; access control; antispoofing technology; edge security device; enterprise oriented network architecture; identity information; identity-based Internet protocol networking; network admission control; network operations; security posture; Authentication; IP networks; Measurement; Ports (Computers); Protocols; Servers; Attribution; IPv6; identity; insider threat; next generation networking; policy-based networking;
Conference_Titel :
MILITARY COMMUNICATIONS CONFERENCE, 2012 - MILCOM 2012
Conference_Location :
Orlando, FL
Print_ISBN :
978-1-4673-1729-0
DOI :
10.1109/MILCOM.2012.6415566