Zero trust access authorization and control of network boundary based on cloud sea big data fuzzy clustering

With the digital transformation of enterprises, the traditional security defense technology has been unable to meet the security requirements of enterprises, and the data security and privacy protection have brought great challenges to the Internet. Therefore, taking zero trust as the security conce...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of intelligent & fuzzy systems 2022-01, Vol.43 (3), p.3189-3201
Hauptverfasser: Zhao, Li, Sun, Meng, Yang, Binbin, Xie, Junpeng, Feng, Jiqiang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:With the digital transformation of enterprises, the traditional security defense technology has been unable to meet the security requirements of enterprises, and the data security and privacy protection have brought great challenges to the Internet. Therefore, taking zero trust as the security concept and taking the network boundary as the best practice landing technology architecture, this paper studies the zero trust access authorization and control of network boundary based on cloud big data fuzzy clustering of. Through the network stealth technology, it constructs a virtual boundary for the enterprise, uses the cloud big data fuzzy clustering algorithm to mine the user behavior related data, and designs the trust evaluation mechanism to obtain the user trust level. The dynamic access authorization control mechanism is designed to judge the access requests in and out of the permission boundary. Combined with the user’s trust level, the legal requests and illegal requests are distinguished to complete the zero trust access authorization and control of network boundary. Experimental results show that: the method can accurately control the access authorization of the network boundary, improve the success rate of access authorization and control interaction; the interception rate of illegal access is high, and it has high securit.
ISSN:1064-1246
1875-8967
DOI:10.3233/JIFS-220128