A Micro-Segmentation Method Based on VLAN-VxLAN Mapping Technology

Author:

Li Di12ORCID,Yang Zhibang3,Yu Siyang4,Duan Mingxing15,Yang Shenghong1

Affiliation:

1. College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China

2. Information & Network Center, Hunan Agricultural University, Changsha 410128, China

3. Hunan Province Key Laboratory of Industrial Internet Technology and Security, Changsha University, Changsha 410022, China

4. College of Information Technology and Management, Hunan University of Finance and Economics, Changsha 410205, China

5. Shenzhen Institute, Hunan University, Shenzhen 518063, China

Abstract

As information technology continues to evolve, cloud data centres have become increasingly prominent as the preferred infrastructure for data storage and processing. However, this shift has introduced a new array of security challenges, necessitating innovative approaches distinct from traditional network security architectures. In response, the Zero Trust Architecture (ZTA) has emerged as a promising solution, with micro-segmentation identified as a crucial component for enabling continuous auditing and stringent security controls. VxLAN technology is widely utilized in data centres for tenant isolation and virtual machine interconnection within tenant environments. Despite its prevalent use, limited research has focused on its application in micro-segmentation scenarios. To address this gap, we propose a method that leverages VLAN and VxLAN many-to-one mapping, requiring that all internal data centre traffic routes through the VxLAN gateway. This method can be implemented cost-effectively, without necessitating business modifications or causing service disruptions, thereby overcoming the challenges associated with micro-segmentation deployment. Importantly, this approach is based on standard public protocols, making it independent of specific product brands and enabling a network-centric framework that avoids software compatibility issues. To assess the effectiveness of our micro-segmentation approach, we provide a comprehensive evaluation that includes network aggregation and traffic visualization. Building on the implementation of micro-segmentation, we also introduce an enhanced asset behaviour algorithm. This algorithm constructs behavioural profiles based on the historical traffic of internal network assets, enabling the rapid identification of abnormal behaviours and facilitating timely defensive actions. Empirical results demonstrate that our algorithm is highly effective in detecting anomalous behaviour in intranet assets, making it a powerful tool for enhancing security in cloud data centres. In summary, the proposed approach offers a robust and efficient solution to the challenges of micro-segmentation in cloud data centres, contributing to the advancement of secure and reliable cloud infrastructure.

Funder

China University Industry-University-Research Innovation Fund-Cloud University Project

Shenzhen Science and Technology Program

Scientific Research Fund of Hunan Provincial Education Department

Provincial Natural Science Foundation of Hunan

Program of National Natural Science Foundation of China

Publisher

MDPI AG

Reference32 articles.

1. Energy-Efficient Stochastic Task Scheduling on Heterogeneous Computing Systems;Li;IEEE Trans. Parallel Distrib. Syst.,2014

2. A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users;Liu;IEEE Trans. Cloud Comput.,2021

3. Liu, S., Liu, J., Wang, H., and Xian, M. (2020, January 17–19). Research on the Development of Cloud Computing. Proceedings of the 2020 International Conference on Computer Information and Big Data Applications (CIBDA), Guiyang, China.

4. CAICT Cloud Computing White Paper, China Academy of Information and Communications Technology. Available online: http://www.caict.ac.cn/kxyj/qwfb/bps/202407/t20240723_488241.htm.

5. Jericho Forum (2024, September 01). Jericho Forum Commandments Version 1.2; Technical Report; Jericho Forum. Available online: https://collaboration.opengroup.org/jericho/commandments_v1.2.pdf.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3