Abstract: |
Nowadays, telecommuting, in which users connect to a corporate network from remote locations such as their homes, is increasing as a measure to prevent COVID-19 spread. However, telecommuting exposes companies to information security risks by allowing users to connect terminals from their home that is out of control. If the terminal is infected with malware, it may become a bridgehead which allows lateral movement in the corporate network. Further security enhancements are required for ensuring secure telecommuting, but they easily cause trade-off issues between security and business efficiency that the administrator has to solve.
As a solution to this problem, we have proposed an access control system to minimize the loss of business efficiency while enhancing security. The system calculates the reliability of each connected user and implements network access control, which allows connection to many resources if the user's reliability is high, and minimizes the number of resources available for connection if the user's reliability is low. The system frequently recalculates reliability and updates access control dynamically. This would secure the network by minimizing a user's access range when the user's reliability is decreased for any reason, and restore the accessible range to recover business efficiency when the user's reliability returns to normal. Since it is important to implement access control to adapts to changing conditions from moment to moment, the higher the frequency of access control updates, the better. However, frequent updating of access control can be a heavy load to network equipment.
In this research, we verified the impact of the dynamic access control function on the corporate network when the proposed system is implemented. The proposed system was implemented in a pseudo-corporate network using SDN. While communicating with resource servers and clients in the corporate network, access control was updated by recalculating reliability with different frequency. Then, we confirmed how the communication would be affected. We also verified environmental differences using computers with different CPU in the SDN switch that performs network access control.
Experiments were conducted on the frequency of access control updates, varying from (I) every 30 s (seconds), (II) every 20 s, (III) every 10 s, and (IV) every 5 s. 6 couples of clients and servers in the corporate network communicate through SMB, and we calculate the average of transfer time measurements for a file of about 660 MB.
The experimental results showed that the file transfer time slightly deteriorates by comparing with baselines that does not deploy the dynamic update. In the case that a software switch using high-performance hardware, the average time increases (I) 45 s, (II) 43 s, (III) 53 s, and (IV) 57 s from 41 s. For using low-performance hardware, the time increases, (I) 58 s, (II) 53 s, (III) 60 s, and (IV) 72 s from 59 s.
In conclusion, it was confirmed that although the time did not simply obey monotonic increase, the high frequency of updates caused additional latency in communication. It was also confirmed that there were differences depending on the performance of the SDN switch equipment. (IV) is an experiment that assumes an unrealistic excessive frequency, which has clearly affected the results. However, it is still considered to be practical enough, since it lasts at most 10 s. |