2018
DOI: 10.17487/rfc8329
|View full text |Cite
|
Sign up to set email alerts
|

Framework for Interface to Network Security Functions

Abstract: This document describes the framework for Interface to Network Security Functions (I2NSF) and defines a reference model (including major functional components) for I2NSF. Network Security Functions (NSFs) are packet-processing engines that inspect and optionally modify packets traversing networks, either directly or in the context of sessions to which the packet is associated.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 3 publications
0
12
0
Order By: Relevance
“…Despite the promising trends, we must ascertain the substantial heterogeneity in cyber-security tools and their interfaces, which hinders their composition in flexible and agile platforms and leads to non-interoperable vertical silos and a substantial market fragmentation. Indeed, the lack of open and clear specifications for control and management interfaces is already known, despite recent attempts to define a common framework [8].…”
Section: Evolving Cyber-security Marketmentioning
confidence: 99%
See 3 more Smart Citations
“…Despite the promising trends, we must ascertain the substantial heterogeneity in cyber-security tools and their interfaces, which hinders their composition in flexible and agile platforms and leads to non-interoperable vertical silos and a substantial market fragmentation. Indeed, the lack of open and clear specifications for control and management interfaces is already known, despite recent attempts to define a common framework [8].…”
Section: Evolving Cyber-security Marketmentioning
confidence: 99%
“…The Security Controller is the smart entity that automates as much as possible all security workflows. According to on-going initiatives [8], the main role The second, and more challenging, is the derivation of the necessary information from an on-going attack or offline analysis [14,15]. While the former is already addressed by several standardization initiatives (e.g., STIX), the latter…”
Section: Security Controllermentioning
confidence: 99%
See 2 more Smart Citations
“…We note the work by the IETF Interface to Network Security Functions (I2NSF) working group [5], which describes a framework and reference model for the integration of network security functions. RFC8329 [40] specifically highlights the importance of authentication, authorisation and auditing (AAA) of application functions and management of overlapping security policy. While TENNISON is currently a singledomain prototype implementation, the framework aligns with the recommendations of I2NSF e.g.…”
Section: ) Northbound Interface (Nbi)mentioning
confidence: 99%