THE MODEL OF ZERO TRUST FOR HYBRID PEER-TO-PEER NETWORK
DOI:
https://doi.org/10.31891/2219-9365-2024-79-31Keywords:
peer-to-peer network, zero trust, cyber threat, attack, authentication, monitoring, trusted zone, self-isolationAbstract
In the article an advanced Zero Trust model for hybrid peer-to-peer networks that combine centralized and decentralized management mechanisms was presented. The study addresses the critical need for enhanced security in such networks, characterized by dynamic architectures, the absence of a single control center, heterogeneity of nodes, and increased risks of unauthorized access. Traditional perimeter-based security approaches are insufficient for environments with blurred network boundaries and highly dynamic participants. The proposed model integrates the fundamental principles of the Zero Trust concept, including comprehensive verification of all requests, the principle of least privilege, network segment isolation, continuous activity monitoring, and data security assurance. Authentication and authorization mechanisms ensure the verification of every request, irrespective of its origin or prior interactions. The introduction of short-term trusted zones achieves a balance between increased network performance and strict security requirements by allowing nodes to interact temporarily within protected subnets with minimal latency. A novel approach to data segmentation and the use of diverse encryption algorithms enhances the confidentiality and integrity of information. Special attention is given to the development of self-isolation mechanisms for nodes, enabling rapid responses to potential threats such as DDoS attacks, phishing, or data breaches. These mechanisms localize security incidents and prevent their propagation to other network segments. Additionally, the proposed access control model accounts for the specific characteristics of hybrid P2P architectures, ensuring the protection of nodes and resources from malicious attacks.