Research on Zero Trust Evaluation Method for Network Security

With the rapid progress and development in fields such as cloud computing, Internet of Things, and mobile offices, the traditional fortress-style network architecture has exposed many problems. In response to the increasingly severe network security situation, zero-trust security proposes a new netw...

Full description

Saved in:
Bibliographic Details
Published in2023 3rd International Conference on Frontiers of Electronics, Information and Computation Technologies (ICFEICT) pp. 449 - 454
Main Authors Hong, Sheng, Yu, Ziyun, Zou, Xinhao, Yin, Hongwei, Xiao, Yuchen, Wang, Wenhao
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.05.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:With the rapid progress and development in fields such as cloud computing, Internet of Things, and mobile offices, the traditional fortress-style network architecture has exposed many problems. In response to the increasingly severe network security situation, zero-trust security proposes a new network architecture based on the idea of "continuous verification, never trust". The zero-trust network architecture can effectively reduce traditional network security threats and better protect network systems and sensitive resources. Based on the zero-trust security concept, this article proposed a new access control model based on trust and attributes, introduced the mechanisms and algorithms of the access control model, and designed a zero-trust simulation platform for testing. This model can determine whether to allow the request based on the trust value and relevant security attributes of the access request, which greatly improves the security of the network system and reduces security risks from internal and external sources.
DOI:10.1109/ICFEICT59519.2023.00080