Microsegmentation 2
Microsegmentation 2
net/publication/382335849
CITATIONS READS
9 1,178
2 authors, including:
Rafat Alshorman
Yarmouk University
24 PUBLICATIONS 91 CITATIONS
SEE PROFILE
All content following this page was uploaded by Rafat Alshorman on 18 July 2024.
Received 21 Sep. 2023, Revised 26 Jun. 2024 , Accepted 28 Jun. 2024 , Published 26 Sep. 2024
Abstract:Due to the increasing number of threats and attacks that have threatened the network in recent years, novel methods and
techniques have been improved to secure the infrastructure of the network and the data transmitted within it. Micro-segmentation and
segmentation techniques are popularly used over computer networks to reduce defensive versus cyberattack. These techniques aim to
minimise the damage obtained from attackers by segmenting the network into many clusters or sections and limiting the communications
among them. Thus, each cluster or segment within the network becomes isolated from the others, which increases the security of
highly sensitive data networks and prevent unauthorised people and attackers from accessing these sensitive data. In this paper, an
enhanced environment has been suggested using NSX-T VMware to overcome the limitations of conventional micro-segmentation and
segmentation environments. the suggested environment NSX-T with Sky ATP and policy enforcer to enhance the performance and
security of the network. The suggested environment is presented to deal with large environments that involve multi-hypervisors and
multiple clouds. The performance of this environment has been combined with the other two scenarios. The results of the comparison
proved that the performance of this suggested scenario is better than those of the other two scenarios. In addition, the results illustrated
that security, workload mobility, and flexibility are higher within this scenario, whereas consumed time, cost, and complexity are lower
than those in other scenarios.
Keywords: Micro-segmentation, Segmentation, cyberattack, Clusters, Security, Attackers, NSX-T, Sky API, policy enforcer
fidentiality attributes are conventionally used to define the the system are not completely incorporated. Thus, future
security of a computer. Availability means the avoiding of versions should completely incorporate the components of
unauthorised resources or information withholding, while the system. Furthermore, [9] plan to explore techniques
integrity means the avoiding of unauthorised information based on population like grammatical evolution, particle
alternation. Furthermore, confidentiality means the avoiding swarm, and genetic algorithms to enhance the behaviour
of unauthorised information disclosure [7]. of systems based on effective candidate structures. Archi-
tectures of network segmentation have been suggested by
Network security is a complicated subject, historically [10] as use case forms that are appropriate for information
only tackled by well-trained and experienced experts. How- loss and security. The suggested system combined between
ever, as more and more people become “wired”, an increas- simulation modelling and computational intelligence to es-
ing number of people need to understand basics of security timate and construct the architectures as well as acclimate
in a networked world. to the variation in threat to. The outcomes of the study show
that the suggested system can acclimate to the variation in
Two scenarios for the implementation of micro- threat levels and segment architectures at acceptable risk
segmentation and segmentation within networks have been threshold within a certain threat environment. Furthermore,
studied. An enhanced scenario has been suggested to over- recent work has addressed the requirement of systems
come the limitations of conventional micro-segmentation that based on the architectures to minimise the loss of
and segmentation scenarios. The suggested scenario inte- information within actual time and to obtain ideal decisions
grates NSX-T micro-segmentation with Sky API and policy for cyber security. On the other hand, this system can
enforcer to enhance the security and performance of the be enhanced in the future to handle segmentation policy
network. composition, automation, and synthesis. In addition, con-
The paper consists of four other sections, where many trols of network segmentation, which involve components
Previous works have been reviewed within the second and productive potentials of cyber security, can be used to
section, while micro-segmentation and segmentation tech- achieve network security. Another segmentation technique
niques have been studied within the third section. The is micro-segmentation, which is a novel security technique
methodology of the study has been illustrated in the fourth that divides physical networks into separated logical work-
section. The results of the study have been discussed in the loads or micro-segments. Thus, an analytical framework has
fifth section. A conclusion of the study has been provided been developed by [11] to quantify and characterise the
in the last section. micro-segmentation effectiveness in improving the security
of networks. A framework based on attack graphs and
2. Related Works network connectivity was used to estimate the robustness
Layered protection and network segmentation strategies and exposure network. The results show that the use of
are considered essential to construct a more secure network. micro-segmentation enhances the network robustness and
Thus, guarded commands and family algebra have been exposure reduction in a range extending between 60% and
utilised by [8] to form a formalism and define the seg- 90%. According to [12], the secure design of a network
mentation of the network. A series of resources and their based on micro-segmentation can reduce the movement
polices of access control have been used to suggest two rate of attackers within the network. It also offers more
algorithms that represent output and input strong network chances to discover this movement. However, organizations
topology in addition to firewall policies. The formalism of that use a secure design of the network will discover
network segmentation has been used to compute the utilised that micro-segmentation adds more complexity and cost to
firewall policies, which are then strategically inserted into the network as compared with the percentage of incidents
the network for performing “Defence in Depth (DD)”. severity and number reduction. On the other hand, the
Moreover, a “Software Defined Network (SDN)” has been effort prolonged in segmenting, classifying, and learning
built using the suggested algorithms and the use of SDN network strengthens and value for the whole controls of the
within “Internet of Things (IoT)” and dynamic networks organisation. Due to the absence of pure guidance on how
has been discussed. The issue of cyber decision about segmentation can be suitably implemented within recent
how a suitable segmentation architecture for the network architectures, a Markov continuous-time chain has been
can be selected has been studied within this literature. suggested as a low-cost method to estimate architecture
The selection of architecture is based on the mission and performance. In addition, the chain allows security prac-
security behaviour in a certain environment of networking. titioners to observe more than one candidate architecture
A new method has been suggested to support the selection of segmentation to determine the most optimal model that
decision using agent-based simulation and a heuristic search fits with their network environment[13]. According to [14],
approach. The suggested prototype system has been imple- the impact of a conventional perimeter that is based on
mented within a simple case study to obtain better or ideal security becomes less effective due to the movement of
architectures that support the environment of a network data centres towards the visualisation of storage resources,
exposed to cyber-attacks. Within the suggested prototype networking, and computing. Thus, novel models of secure
system version, several manual actions are demanded to data centres should be based on software, involve the model
begin the execution of components, and the components of of zero trust, and adopt micro-segmentation. [15] focused
https:// journal.uob.edu.bh/
Int. J. Com. Dig. Sys. 16, No.1, 1499-1508 (Sep-24) 1501
https:// journal.uob.edu.bh/
1502 H.Al-Ofeishat , et al.: Build a Secure Network using Segmentation and Micro-segmentation Techniques.
Number
of Location
Component name com- within the
po- environment
nents
external
External Firewall devices 2
firewall cluster
switching fab-
Core switches 2
ric cluster
switching fab-
Access switches 2
ric cluster
Hypervisor
VMware 2
cluster
Virtual layer
VM-APP 1
cluster
Figure 2. VMware NSX with micro-segmentation example [33]. Virtual layer
VM-DB 1
cluster
Virtual layer
APP VLANs 1
incompatible usage risk. cluster
4) 4. Management of streamlined policy: firewall po- Virtual layer
DB VLANs 1
lices can be managed simply through the particu- cluster
lar architecture of micro-segmentation. A particular Virtual layer
consolidated policy is used by this arising best Internal un-routed VXLAN cluster (Inside
2
practise to reduce and detect threats and to control switch hypervisor
subnet access within one network section. Hence, the hosts)
security posture of organizations can be reinforced
and the surface of attack can be also minimised using
this approach. between the VMs and the identical virtual or logical switch
is presented [20].
Due to the increasing number of advanced permanent
threats that spread through application vulnerabilities and 5. Methodology
targeted users, multiple network-layer segmentation is re- The methodology of this paper is based on reviewing
quired to maintain an appropriate posture of protection and three different scenarios to show how the performance and
security. Therefore, security controls at the application level, security of the network can be enhanced by segmentation.
like developed aware protection and application-level inter- The first scenario represents the conventional segmenta-
vention protection, are required for these developed threats tion environment, while the second represents the micro-
to conserve selected workloads [31]. Micro-segmentation segmentation environment. The third scenario represents the
with NSX represents a suitable platform to deal with these suggested environment that integrates NSX-T with Sky ATP
threats. Thus, VMware NSX enhances micro-segmentation and policy enforcer to overcome the limitations of the other
to be more cost-effective, operationally feasible, and scal- two scenarios and to enhance the performance and security
able. Furthermore, NSX supports micro-segmentation with of the network. The structure, components, and topology of
service sequence for partner services, overlay-based separa- these scenarios are shown below:
tion, distributed firewalking, and central policy controls to
A. The Structure of the Environment
address the security requirements for the rapidly developing
landscape of information technology [32]. An example of The studied environment was segmented into four main
implementing VMware NSX within micro-segmentation is clusters: external firewall, switching fabric, hypervisor, and
illustrated in Figure 2. virtual layer clusters. “Virtual Extensible LAN (VXLAN)”
has also been introduced to perform logical segmentation
The distributed firewall is the key module used within for “Virtual Machines (VMs)”. Because VXLAN has vari-
the micro segmentation. Furthermore, the implementation of ous types of behaviour and overhead, it has been selected
NSX deployed the distributed firewall into every hypervisor within this structure instead of VLANs to enhance the
as a core module. Thus, the policy rules for distributed results. Furthermore, two databases and application roles
enforcement can be centrally configured. Traffic can be VM have been used to represent the participants of the
filtered by distributing the firewall over the level extended test environment. The key components involved within the
between the 2nd layer and the 4th layer. Therefore, the rules constructed environment are shown in the table II:
of security can be implemented only when a connection
Two simple scenarios were selected to investigate and
https:// journal.uob.edu.bh/
1504 H.Al-Ofeishat , et al.: Build a Secure Network using Segmentation and Micro-segmentation Techniques.
https:// journal.uob.edu.bh/
1506 H.Al-Ofeishat , et al.: Build a Secure Network using Segmentation and Micro-segmentation Techniques.
a novel micro-segmentation approach. However, these two [13] N. Wagner, C. Ş. Şahin, J. Pena, J. Riordan, and S. Neumayer,
scenarios are not adequate for dealing with large environ- “Capturing the security effects of network segmentation via a
ments that involve multiple hypervisors and multiple clouds. continuous-time markov chain model,” in Proceedings of the 50th
Annual Simulation Symposium, 2017, pp. 1–12.
Therefore, an enhanced environment has been suggested in
this paper to overcome these limitations. The suggested en- [14] . L. Muller and J. Soto, “Micro-segmentation for dummies,” Tech.
vironment inserted the NSX-T VMware product for micro- Rep,Wiley and Sons, 2015.
segmentation to enhance network security. The results of
the comparison confirmed that the performance of the [15] A. K. Dwivedi, M. Dwivedi, and M. Kumar, “Advances in network
suggested environment network is better within Scenario security: A comprehensive analysis of measures, threats, and future
research directions,” 2023.
3. The comparison shows that Scenario 3 provides higher
security, performance, flexibility, and workload mobility. [16] J. Turner, “7 network segmentation best practices to level-
up your security,” Strongdm, 2024. [Online]. Available: https:
References //www.strongdm.com/blog/network-segmentation
[1] A. Deshpande, “Introduction to network security,” International
Journal of Computer Sciences and Engineering, vol. 3, no. 9, pp. [17] T. Olzak, “Vlan network segmentation and security-chapter
124–134, 2015. 5,” Retrieved on, vol. 15, no. 02, p. 2015, 2021. [Online].
Available: http://web.archive.org/web/20080207010024/http://www.
[2] A. Kulkarni, A. Shivananda, A. Kulkarni, A. Kulkarni, A. Shiv- 808multimedia.com/winnt/kernel.htm
ananda, and A. Kulkarni, “Ted talks segmentation and topics
extraction using machine learning,” Natural Language Processing [18] Guardicore, “Network segmentation and micro-segmentation in
Projects: Build Next-Generation NLP Applications Using AI Tech- modern enterprise environments,” White paper, 2019.
niques, pp. 65–88, 2022.
[19] M. Alabbad and R. Khedri, “Dynamic segmentation, configuration,
[3] J. Toivakka, “Network segmentation,” 2018. and governance of sdn,” Journal of Ubiquitous Systems and Perva-
sive Networks, vol. 16, no. 1, pp. 7–22, 2022.
[4] K. F. WR.Simpson, “Network segmentation and zero trust architec-
tures,” in Proceedings of the Fifth International C* Conference on [20] P. Bala, “Network micro-segmentation,” SCRIBD, 2023.
Computer Science and Software Engineering, ser. WCE, July 7-9, [Online]. Available: https://www.scribd.com/document/564160802/
2021. Network-Micro-Segmentation
[5] D. Annu and A. Dudy, “Review of the osi model and tcp/ip protocol [21] “Internal segmentation firewall security where you need it,
suite on modern network communication,” International Journal of when you need it,” White paper, 2016. [Online]. Available:
Current Science Research and Review, pp. 1230—-1239, 2024. https://www.fortinet.com/content/dam/fortinet/assets/white-papers/
wp-isf-security-where-you-need-it-when-you-need-it.pdf
[6] P. Konduru and N. Nethravathi, “Secure and energy-efficient routing
protocol based on micro-segmentation and batch authentication,” [22] JUNIPER Network, “Iot network segmentation,”
Computer Networks, vol. 248, p. 110293, 2024. Engineering Simplicity, pp. 1–4, 2022. [On-
line]. Available: https://www.juniper.net/content/dam/www/assets/
[7] N. Zhang, “An introduction to computer & network security threats,” solution-briefs/us/en/iot-network-segmentation.pdf
International Journal of Advance Research in Computer Science and
Management Studies, pp. 5–10, 2020. [23] N. Basta, M. Ikram, M. A. Kaafar, and A. Walker, “Towards a zero-
trust micro-segmentation network security strategy: an evaluation
[8] N. Mhaskar, M. Alabbad, and R. Khedri, “A formal approach to framework,” in NOMS 2022-2022 IEEE/IFIP Network Operations
network segmentation,” Computers & Security, vol. 103, pp. 102– and Management Symposium. IEEE, 2022, pp. 1–7.
162, 2021.
[24] Zenarmor, “What is network segmentation? introduction to
[9] N. Wagner, C. Şahin, M. Winterrose, J. Riordan, J. Pena, D. Hanson, network segmentation,” Sunny Valley Cyber Security Inc. (d/b/a
and W. W. Streilein, “Towards automated cyber decision support: Zenarmor)., 2023. [Online]. Available: https://www.zenarmor.com/
A case study on network segmentation for security,” in 2016 IEEE docs/network-basics/network-segmentation
Symposium Series on Computational Intelligence (SSCI), 2016, pp.
1–10. [25] P. Assunção, “A zero trust approach to network security,” in Pro-
ceedings of the Digital Privacy and Security Conference, vol. 2019.
[10] K. Ramesh, “Network segmentation strategies to articulate a new Porto Protugal, 2019.
method to address growing information security concerns,” CIOSR
Journal of Engineering (IOSRJEN), vol. 8, no. 6, pp. 43–52, 2018. [26] D. Eidle, S. Y. Ni, C. DeCusatis, and A. Sager, “Autonomic security
for zero trust networks,” in 2017 IEEE 8th Annual Ubiquitous
[11] N. Basta, M. Ikram, M. A. Kaafar, and A. Walker, “Towards a zero- Computing, Electronics and Mobile Communication Conference
trust micro-segmentation network security strategy: an evaluation (UEMCON). IEEE, 2017, pp. 288–293.
framework,” in NOMS 2022-2022 IEEE/IFIP Network Operations
and Management Symposium. IEEE, 2022, pp. 1–7. [27] C. DeCusatis, P. Liengtiraphan, A. Sager, and M. Pinelli, “Imple-
menting zero trust cloud networks with transport access control and
[12] B. Peterson, “Secure network design: Micro segmentation.” first packet authentication,” in 2016 IEEE International Conference
ISSA Journal, vol. 14, no. 12, 2016. [Online]. Available: on Smart Cloud (SmartCloud). IEEE, 2016, pp. 5–10.
https://sansorg.egnyte.com/dl/6p0mC8GPeQ
[28] T. E. Nyamasvisva and A. A. M. Arabi, “a comprehensive swot
https:// journal.uob.edu.bh/
1508 H.Al-Ofeishat , et al.: Build a Secure Network using Segmentation and Micro-segmentation Techniques.
analysis for zero trust network security model,” International Jour- Rafat Alshorman is an associate professor
nal of Infrastructure Research and Management Vol. 10 (1), June in the department of computer science at
2022, 2022. Yarmouk University/Jordan. He completed
his Ph.D. at Loughborough University/UK
[29] D. Huang, A. Chowdhary, and S. Pisharody, Software-Defined
networking and security: from theory to practice. CRC Press, and his undergraduate studies at Yarmouk
2018. University
Jordan. His research interests lie in the
[30] K.Ekambaram and M. Varun, “Microsegmentation: Defense in area of algorithms and mathematical models,
depth,” Dell Technologies Proven Professional Knowledge Sharing, ranging from theory to implementation, with
pp. 1–8, 2021. [Online]. Available: https://education. a focus on checking the correctness condi-
dell.com/content/dam/dell-emc/documents/en-us/2021KS
Ekambaram-Microsegmentation Defense in Depth.pdf
tions of concurrent and reactive systems. In recent years, he has
focused on theoretical computer science such as Graph theory
[31] W. Holmes, “Mmicro-segmentation defined – nsx and Numerical analysis. Dr. Alshorman research interests are: 1.
securing– part i,” VMware, 2016. [Online]. Mathematical methods in computer science 2. Temporal logics 3.
Available: https://blogs.vmware.com/networkvirtualization/2016/06/ Concurrent systems 4.Machine learning 5. Network Security.
micro-segmentation-defined-nsx-securing-anywhere.html/
https:// journal.uob.edu.bh/