Canaries in the Network

Slides:



Advertisements
Similar presentations
Software-defined networking: Change is hard Ratul Mahajan with Chi-Yao Hong, Rohan Gandhi, Xin Jin, Harry Liu, Vijay Gill, Srikanth Kandula, Mohan Nanduri,
Advertisements

Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
PlanetLab Operating System support* *a work in progress.
LAN DESIGN. Functionality - the network must work with reasonable speed and reliability.
Ethernet and switches selected topics 1. Agenda Scaling ethernet infrastructure VLANs 2.
Course Name- CSc 8320 Advanced Operating Systems Instructor- Dr. Yanqing Zhang Presented By- Sunny Shakya Latest AOS techniques, applications and future.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
MSIT 458: Information Security & Assurance By Curtis Pethley.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Lesson 9: Creating and Configuring Virtual Networks
Installing software on personal computer
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
Network Topologies.
VLAN Trunking Protocol (VTP) W.lilakiatsakun. VLAN Management Challenge (1) It is not difficult to add new VLAN for a small network.
Virtualization Week 20. This week Virtualization – What is it? – Software on different operating systems? Group Presentations – minutes per group.
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
Software Defined-Networking. Network Policies Access control: reachability – Alice can not send packets to Bob Application classification – Place video.
Basic LAN techniques IN common with all other computer based systems networks require both HARDWARE and SOFTWARE to function. Networks are often explained.
Software Defined Networking Kathryn Abbett. Definition □Origins from Berkley and Stanford, around 2008 □Software-Defined Networking (SDNs) allows applications.
LAN Switching and Wireless – Chapter 1
Chapter 2 Network Topology
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Day11 Devices/LAN/WAN. Network Devices Hub Switches Bridge Router Gateway.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Operating Systems Security
Data Communications and Networks Chapter 1 - Classification of network topologies Data Communications and Network.
1 VLANs Relates to Lab 6. Short module on basics of VLAN switching.
Characteristics of Scaleable Internetworks
Network Components and terms. Hub is a device for connection multiple ethernet devices together and making then act as a single network segment.
Network Troubleshooting CT NWT NameTP No. Gan Pei ShanTP Tan Ming FattTP Elamparithi A/L ThuraisamyTP Tan Ken SingTP
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Muhammad Waseem Iqbal Lecture # 20 Data Communication.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Xin Li, Chen Qian University of Kentucky
Chapter 1: Exploring the Network
Modularity Most useful abstractions an OS wants to offer can’t be directly realized by hardware Modularity is one technique the OS uses to provide better.
Bentley Systems, Incorporated
Multi-layer software defined networking in GÉANT
Fault Tolerance Comparison
SECURITY ZONES.
Large Distributed Systems
Framework of Network Virtualization for Future Networks
NOX: Towards an Operating System for Networks
Distributed Systems CS
Chapter 4 Data Link Layer Switching
Introduction to Networking
3.2 Virtualisation.
Instructor: Mr. Malik Zaib
Oracle Solaris Zones Study Purpose Only
Storage Virtualization
1. 2 VIRTUAL MACHINES By: Satya Prasanna Mallick Reg.No
Faiza Iqbal Mobile Networks Faiza Iqbal EC-425 Mobile Networks Lab 1.
Virtual Private Servers – Types of Virtualization platforms Virtual Private ServersVirtual Private Servers, popularly known as VPS is considered one of.
Chapter 2. Malware Analysis in VMs
Implement Inter-VLAN Routing
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
IS4680 Security Auditing for Compliance
Medium-Sized Switched Network Construction
Fault-tolerant Consensus in Directed Networks Lewis Tseng Boston College Oct. 13, 2017 (joint work with Nitin H. Vaidya)
Cloud computing mechanisms
Architectures of distributed systems Fundamental Models
Managing Services with VMM and App Controller
Computer communications
Implement Inter-VLAN Routing
Architectures of distributed systems Fundamental Models
Distributed Systems CS
Implement Inter-VLAN Routing
Connecting to the Network
Architectures of distributed systems Fundamental Models
Implement Inter-VLAN Routing
In-network computation
Presentation transcript:

Canaries in the Network Vincent Liu Danyang Zhuo, Qiao Zhang, Xin Yang

Jim Gray. “Why Do Computers Stop and What Can Be Done about It?” 1985.  Change is dangerous

Today’s Large Networks Are Just as Vulnerable How can we keep the control plane available in the face of change? Govindan et al. 2016

Possible Solution: Canaries 99% Users 1%

Possible Solution: Network Canaries Announce: 1.1.1.1/248 Naïve canarying does not protect against many errors Networks are connected! Errors can propagate

Goal: Isolated Network Canaries Known Correct Split network into known correct and canary control plane instances Safely roll out changes, reason about their potential effects

Approach: Taint Tracking in the Network Direct communication between controllers Indirect communication via mutually controlled hardware ip route 1.1.1.0/24 Ethernet1/2 1.1.1.1 Announce 1.1.1.1/8

First Step: Notice That This Is Impossible Partitioned control planes The control planes must not talk to one another Physical isolation The same device cannot be managed by two control planes Global properties (e.g., connectivity) If there is a correct path between two servers, they should be able communicate

Second Step: Relax The Requirements Physical Partitioning prioritizes: (1) Partitioned control plane (2) Physical isolation Logical Partitioning prioritizes: (3) Global properties like connectivity

Design 1: Physical Partitioning Known correct Canary Known correct Known correct Connected components are each managed by a single control plane Control planes do not talk to one another or share hardware Upgrades are rolled one component at a time

Design 1: Physical Partitioning Known correct Canary Known correct Known correct Pros: Cons: Strong isolation Some routing policies are impossible Simple filtering at boundaries Failures can cause inefficiency

Design 2: Logical Partitioning Known correct Canary Known correct Known correct How do we approximate isolation with many control planes on each switch? Isolate state using techniques like VLANs Isolate performance using weighted fair queuing Updates are installed and traffic is incrementally rolled onto a canary slice

Design 2: Logical Partitioning Known correct Canary Known correct Known correct Pros: Cons: Routing is the exact same as today Not physically isolated Flexible rollout Non-protected upgrades are sometimes necessary Defends against “DDoS” attacks

Open Questions How does this fit with the rest of the workflow? For physical partitioning, how do we divide topologies? How do we design topologies that operate well under failure? Can we build failure-isolated VMs for switch OSes? What hardware abstractions would we need? Are there other useful ways to partition?

Our goal: Add true fault isolation to network canaries Summary Our goal: Add true fault isolation to network canaries Physical partitioning: Prioritize control plane isolation and physical isolation Split the network into connected subgraphs, each managed independently Logical partitioning: Prioritize control plane isolation and global properties like connectivity Split each switch into multiple virtual switches isolated by VLANs, WFQing