SIMPLE-fying Middlebox Policy Enforcement Using SDN Zafar Ayyub Qazi, Cheng-Chun Tu, Luis Chiang Vyas Sekar, Rui Miao, Minlan Yu Presenter : ChoongHee.

Slides:



Advertisements
Similar presentations
Seyed K. Fayazbakhsh Vyas Sekar Minlan Yu Jeff Mogul
Advertisements

Practical and Incremental Convergence between SDN and Middleboxes 1 Zafar Qazi, Cheng-Chun Tu, Luis Chiang Vyas Sekar Rui Miao Minlan Yu.
Toward Practical Integration of SDN and Middleboxes
SIMPLE-fying Middlebox Policy Enforcement Using SDN
A Search Memory Substrate for High Throughput and Low Power Packet Processing Sangyeun Cho, Michel Hanna and Rami Melhem Dept. of Computer Science University.
VCRIB: Virtual Cloud Rule Information Base Masoud Moshref, Minlan Yu, Abhishek Sharma, Ramesh Govindan HotCloud 2012.
Composing Software Defined Networks
A Scalable and Reconfigurable Search Memory Substrate for High Throughput Packet Processing Sangyeun Cho and Rami Melhem Dept. of Computer Science University.
Nanxi Kang Princeton University
Programmable Measurement Architecture for Data Centers Minlan Yu University of Southern California 1.
Slick: A control plane for middleboxes Bilal Anwer, Theophilus Benson, Dave Levin, Nick Feamster, Jennifer Rexford Supported by DARPA through the U.S.
Toward Practical Convergence of Middleboxes and Software-Defined Networking Vyas Sekar Joint work with: Seyed Kaveh Fayazbakhsh, Zafar Qazi, Luis Chiang,
Practical and Incremental Convergence between SDN and Middleboxes 1 Zafar Qazi Cheng-Chun Tu Luis Chiang Vyas Sekar Rui Miao Minlan Yu.
SDN: Extensions Middleboxes 1 Ack: Vyas Sekar, Aaron Gember, Felipe Huici, Zafar Qazi.
Design and Implementation of a Consolidated Middlebox Architecture 1 Vyas SekarSylvia RatnasamyMichael ReiterNorbert Egi Guangyu Shi.
Software Defined Networking COMS , Fall 2013 Guest Speaker: Seyed Kaveh Fayazbakhsh Stony Brook University 11/12/2013: SDN and Middleboxes.
OpenFlow-Based Server Load Balancing GoneWild
SDN and Openflow.
Towards Virtual Routers as a Service 6th GI/ITG KuVS Workshop on “Future Internet” November 22, 2010 Hannover Zdravko Bozakov.
Scalable Flow-Based Networking with DIFANE 1 Minlan Yu Princeton University Joint work with Mike Freedman, Jennifer Rexford and Jia Wang.
Software-Defined Networking
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
The Middlebox Manifesto: Enabling Innovation in Middlebox Deployment 1 Vyas SekarSylvia RatnasamyMichael ReiterNorbert Egi Guangyu Shi.
Hash, Don’t Cache: Fast Packet Forwarding for Enterprise Edge Routers Minlan Yu Princeton University Joint work with Jennifer.
A Survey on Interfaces to Network Security
SIMPLE-fying Middlebox Policy Enforcement Using SDN Zafar Ayyub Qazi Cheng-Chun Tu Luis Chiang Vyas Sekar Rui Miao Minlan Yu.
Justine Sherry*, Shaddi Hasan*, Colin Scott*, Arvind Krishnamurthy†,
Cellular Core Network Architecture
Composing Software Defined Networks Jennifer Rexford Princeton University With Joshua Reich, Chris Monsanto, Nate Foster, and.
Software-Defined Networks Jennifer Rexford Princeton University.
Institute of Computer and Communication Network Engineering OFC/NFOEC, 6-10 March 2011, Los Angeles, CA Lessons Learned From Implementing a Path Computation.
VeriFlow: Verifying Network-Wide Invariants in Real Time
Sungkyunkwan University (SKKU) Security Lab. A Framework for Security Services based on Software-Defined Networking Jaehoon (Paul) Jeong 1, Jihyeok Seo.
Bohatei: Flexible and Elastic DDoS Defense
Central Control over Distributed Routing fibbing.net SIGCOMM Stefano Vissicchio 18th August 2015 UCLouvain Joint work with O. Tilmans (UCLouvain), L. Vanbever.
Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags Seyed K. Fayazbakhsh *, Luis Chiang ¶, Vyas Sekar *, Minlan.
Extending SDN to Handle Dynamic Middlebox Actions via FlowTags (Full version to appear in NSDI’14) Seyed K. Fayazbakhsh, Luis Chiang, Vyas Sekar, Minlan.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Module 10: How Middleboxes Impact Performance
Programming Languages for Software Defined Networks Jennifer Rexford and David Walker Princeton University Joint work with the.
Aaron Gember, Theophilus Benson, Aditya Akella University of Wisconsin-Madison.
SDN and Openflow. Motivation Since the invention of the Internet, we find many innovative ways to use the Internet – Google, Facebook, Cloud computing,
SDN Management Layer DESIGN REQUIREMENTS AND FUTURE DIRECTION NO OF SLIDES : 26 1.
CellSDN: Software-Defined Cellular Core networks Xin Jin Princeton University Joint work with Li Erran Li, Laurent Vanbever, and Jennifer Rexford.
SIMPLE-fying Middlebox Policy Enforcement Using SDN
Jennifer Rexford Princeton University MW 11:00am-12:20pm SDN Programming Languages COS 597E: Software Defined Networking.
FlowTags: Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions Author: Seyed Kaveh Fayazbakhsh, Vyas Sekar, Minlan Yu and Jeffrey.
BUZZ: Testing Context-Dependent Policies in Stateful Networks Seyed K. Fayaz, Tianlong Yu, Yoshiaki Tobioka, Sagar Chaki, Vyas Sekar.
Atrium Router Project Proposal Subhas Mondal, Manoj Nair, Subhash Singh.
Preliminaries: EE807 Software-defined Networked Computing KyoungSoo Park Department of Electrical Engineering KAIST.
BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations Minlan Yu Princeton University Joint work with Alex Fabrikant,
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
Ready-to-Deploy Service Function Chaining for Mobile Networks
SDN and Security Security as a service in the cloud
Xin Li, Chen Qian University of Kentucky
SDN challenges Deployment challenges
SDN Network Updates Minimum updates within a single switch
A Survey of Network Function Placement
University of Maryland College Park
The DPIaaS Controller Prototype
Hydra: Leveraging Functional Slicing for Efficient Distributed SDN Controllers Yiyang Chang, Ashkan Rezaei, Balajee Vamanan, Jahangir Hasan, Sanjay Rao.
15-744: Computer Networking
NOX: Towards an Operating System for Networks
of Dynamic NFV-Policies
Software Defined Networking (SDN)
Chapter 3 VLANs Chaffee County Academy
Programmable Networks
Autonomous Network Alerting Systems and Programmable Networks
Control-Data Plane Separation
Presentation transcript:

SIMPLE-fying Middlebox Policy Enforcement Using SDN Zafar Ayyub Qazi, Cheng-Chun Tu, Luis Chiang Vyas Sekar, Rui Miao, Minlan Yu Presenter : ChoongHee Cho Some slides are brought from the authors’ presentation.

Current Network composition 2 Network component: - Nodes(e.g. switch or router) - Links - Middleboxes : select L2 or L3 path : connected road between the nodes : L4-L7 function for network packet. (e.g. critical performance, security, and policy compliance capabilities, etc.)

Middleboxes management is hard! 3 Critical for security, performance, compliance But expensive, complex and difficult to manage Survey across 57 network operators (J. Sherry et al. SIGCOMM 2012) e.g., a network with ~2000 middleboxes required 500+ operators

Middlebox with SDN 4 Benefits of SDN: – logically centralized management – providing the ability to programmatically configure forwarding rules.

Can SDN simplify middlebox management? Centralized Controller “ Flow ” FwdAction …… “ Flow ” FwdAction …… OpenFlow 5 Proxy IDS Necessity + Opportunity: Incorporate functions markets views as important Scope: Enforce middlebox-specific steering policies Firewall IDS Proxy Web

What makes this problem challenging? Centralized Controller “ Flow ” FwdAction …… “ Flow ” FwdAction …… OpenFlow 6 Proxy IDS 1. Middleboxes introduce new dimensions beyond L2/L3 tasks. Achieve this with unmodified middleboxes and existing SDN APIs Firewall IDS Proxy Web 2. Difficult to change middleboxes

Firewall IDS Proxy Web Our Work: SIMPLE Legacy Middleboxes OpenFlow capable FlowAction …… FlowAction …… 7 Policy enforcement layer for middlebox-specific “traffic steering”

Outline Motivation Challenges SIMPLE Design Evaluation Conclusions 88

Challenges 1)Policy Composition 2)Resource Constraint 3)Dynamic Modifications 99

Challenge: Policy Composition S1 S2 10 Firewall Proxy IDS Oops! Forward Pkt to IDS or Dst? Dst “Loops” Traditional flow rules may not suffice! FirewallIDSProxy * Policy Chain:

Challenge: Resource Constraints S1 S2 S4 S3 Proxy Firewall IDS1 = 50% IDS2 = 50% Space for traffic split? We should consider not only the middlebox resource constraints but also switch TCAM space constraints 11 FirewallIDSProxy * Policy Chain: 1) middlebox processing constraint 2) limited TCAM space in SDN switches IDS Resource constraints

12 S1 Proxy S2 User 1 User 2 Proxy may modify flows Are forwarding rules at S2 correct? Challenge: Dynamic Modifications Firewall User1: Proxy  Firewall User2: Proxy

New dimensions beyond Layer 2-3 tasks 1) Policy Composition  Potential loops 3) Dynamic Modifications  Correctness? 2) Resource Constraints  Switch + Middlebox 13 How can SIMPLE address these with unmodified middleboxes and existing SDN APIs?

Outline Motivation + Context for the Work Challenges SIMPLE Design Evaluation Conclusion 14

Dynamics Handler SIMPLE System Overview Legacy Middleboxes OpenFlow capable Rule Generator FlowAction …… FlowAction …… 15 Policy Chains Firewall IDS Proxy Web Policy Spec Mbox, Switch constraints Topology, Traffic Resource Manager SDN Controller

Composition  Tag Processing State 16 FirewallIDSProxy * Policy Chain: S1 S2 Firewall Proxy IDS Dst ORIGINAL Post-Firewall Post-IDS Post-Proxy Fwd to Dst Insight: Distinguish different instances of the same packet

Composition  Tag Processing State 17

Rule Generator Resource Manager Dynamics Handler SIMPLE System Overview Legacy Middleboxes OpenFlow capable FlowAction …… FlowAction …… 18 Topology, Traffic Policy Spec Mbox, Switch constraints Firewall IDS Proxy Web Policy Chains SDN Controller

Resource Constraints  Joint Optimization Resource Manager Topology & Traffic Middlebox Capacity + Footprints Switch TCAM Policy Spec Optimal & Feasible load balancing Theoretically hard! Not obvious if some configuration is feasible! 19

Offline + Online Decomposition 20 Resource Manager Network Topology Switch TCAM Policy Spec Traffic Matrix ILP-based Offline Stage Deals with Switch constraints LP-based Online Step Deals with only load balancing Mbox Capacity + Footprints

Offline Stage: ILP based pruning 21 Set of all possible middlebox load distributions Pruned Set Balance the middlebox load Feasible Sufficient freedom

Rule Generator Resource Manager Dynamics Handler SIMPLE System Overview Legacy Middleboxes OpenFlow capable FlowAction …… FlowAction …… 22 Topology, Traffic Policy Spec Mbox, Switch constraints Firewall IDS Proxy Web Policy Chains SDN Controller

Modifications  Infer flow correlations 23

Modifications  Infer flow correlations 24 Three cases of flow correlations 1) Not change the packet headers and flows Directly map the incoming and outgoing flows 2) Change packet header fields Do an exact payload match between the incoming and outgoing packets NAT 3) Create new sessions or merge existing sessions Calculate the (partial) similarities across flows

Modifications  Infer flow correlations 25 Correlate flows Install rules S1 Proxy S2 User 1 User 2 Firewall User1: Proxy  Firewall User2: Proxy Payload Similarity With Rabin fingerprints

FW IDS Proxy Web Rule Generator (Policy Composition) Resource Manager (Resource Constraint) Modifications Handler (Dynamic modifications) SIMPLE Implementation OpenFlow 1.0 FlowTag/Tun nel Action …… FlowTag/Tun nel Action …… POX extensions 26 CPLEX

Outline Motivation + Context for the Work Challenges SIMPLE Design Evaluation Conclusion 27

Evaluation and Methodology What benefits SIMPLE offers? load balancing? How scalable is the SIMPLE optimizer? How close is the SIMPLE optimizer to the optimal? How quickly it reacts to middlebox failure and traffic overload? How accurate is the dynamic inference? Methodology – Small-scale real test bed experiments (Emulab) – Evaluation over Mininet (with up to 60 nodes) – Large-scale trace driven simulations (for convergence times) – OpenvSwitch (v 1.7.1) as the SDN switch – Custom Click modules to act as middleboxes 28

Benefits: Load balancing 3-6X better load balancing and near optimal 29 Optimal

Overhead: Reconfiguration Time Around 125 ms to reconfigure, most time spent in pushing rules node topology including 11 switches

Other Key Results LP solving takes 1s for a 252 node topology – 4-5 orders of magnitude faster than strawman optimization schemes 95 % accuracy in inferring flow correlations – Duo to false policy rate and missed policy rate Scalability of pruning(for a 250-node): – 1800s  110s 31

Conclusions Middleboxes: Necessity and opportunity for SDN Goal: Simplify middlebox-specific policy enforcement Challenges: Composition, resource constraints, modifications SIMPLE: policy enforcement layer – Does not modify middleboxes – No changes to SDN APIs – No visibility required into the internal of middleboxes Scalable and offers 3-6X improvement in load balancing 32

FlowTags Commonalities and differences between SIMPLE and FlowTags 33 SIMPLE FlowTags Commonalities: – Want to overcome the traffic handling problems of dynamic middlebox actions – Uses SDN Architecture and Tags Differences : – FlowTags needs simple extensions of middlebox software – FlowTags middleboxes have FlowTags tables and controller–middlebox interfaces – FlowTags has verification, network diagnosis methods in the controller

FlowTags architecture 34

FlowTags example 35

Evaluation 36

Discussion Possibility of rule that would not apply to switches at the same time – update timing issue. Precomputing cost for switch, middlebox, and link failure scenarios. – Pre-computing for all scenarios? Countermeasure against DDOS attack(if all of packet is new) Possibility of duplication use of ToS field Multiple packets per flow case 37

The End

Apendix

Decompose Optimization: Slow Offline + Fast Online Steps Policy Spec Network Topology Enumerate Physical Sequences Prune for Feasible Configs Rule Model Offline Pruning Traffic Matrix LP with PrunedSet Mbox Capacity Online Load Balancing PrunedSet 40

Enumerating Physical Sequences 41 S1 S6 S2 S5 FW1 FW2 10.1/16, HTTP  * Firewall IDS Physical Sequence FW1-IDS1-Proxy1S1 S2 FW1 S2 S4 S5 IDS1 S5 S4 S2 Proxy1 S2 S4 S5 S6 FW2-IDS1-Proxy1S1 S3 FW2 S3 S5 IDS1 S5 S4 S2 Proxy1 S2 S4 S5 S6 S3 Proxy Policy Chains Proxy1 IDS1 S4

FlowTags‐enhanced controller 42

Middlebox extension strategies to add FlowTags support 43