Computer Science and Engineering, University of California, Riverside

Slides:



Advertisements
Similar presentations
Autonomic Scaling of Cloud Computing Resources
Advertisements

SoNIC: Classifying Interference in Sensor Networks Frederik Hermans et al. Uppsala University, Sweden IPSN 2013 Presenter: Jeffrey.
SDN Controller Challenges
Cloud Control with Distributed Rate Limiting Raghaven et all Presented by: Brian Card CS Fall Kinicki 1.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
Fast, Memory-Efficient Traffic Estimation by Coincidence Counting Fang Hao 1, Murali Kodialam 1, T. V. Lakshman 1, Hui Zhang 2, 1 Bell Labs, Lucent Technologies.
First Step Towards Automatic Correction of Firewall Policy Faults Fei Chen Alex X. Liu Computer Science and Engineering Michigan State University JeeHyun.
Active Queue Management: Theory, Experiment and Implementation Vishal Misra Dept. of Computer Science Columbia University in the City of New York.
Efficient Autoscaling in the Cloud using Predictive Models for Workload Forecasting Roy, N., A. Dubey, and A. Gokhale 4th IEEE International Conference.
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
AQM for Congestion Control1 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden.
Shadow Configurations: A Network Management Primitive Richard Alimi, Ye Wang, Y. Richard Yang Laboratory of Networked Systems Yale University.
Björn Landfeldt School of Information Technologies Investigating a theoretical model Bjorn Landfeldt University of Sydney.
Final Project: Project 9 Part 1: Neural Networks Part 2: Overview of Classifiers Aparna S. Varde April 28, 2005 CS539: Machine Learning Course Instructor:
Chapter 6: Database Evolution Title: AutoAdmin “What-if” Index Analysis Utility Authors: Surajit Chaudhuri, Vivek Narasayya ACM SIGMOD 1998.
ISCSI Performance in Integrated LAN/SAN Environment Li Yin U.C. Berkeley.
The 4th IEEE International Conference on Broadband Communications, Networks and Systems (BROADNETS) Raleigh, NC, USA September 10-13, 2007 Measuring Queue.
Performance Testing Tips and Techniques Understanding Operational Profiles Dale L Perry Software Quality Engineering.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
Ns Simulation Final presentation Stella Pantofel Igor Berman Michael Halperin
Quantitative Trading Strategy based on Time Series Technical Analysis Group Member: Zhao Xia Jun Lorraine Wang Lu Xiao Zhang Le Yu.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Design of Cooperative Vehicle Safety Systems Based on Tight Coupling of Communication, Computing and Physical Vehicle Dynamics Yaser P. Fallah, ChingLing.
Presented by Group 2: Presented by Group 2: Shan Gao ( ) Shan Gao ( ) Dayang Yu ( ) Dayang Yu ( ) Jiayu Zhou ( ) Jiayu Zhou.
SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University.
Measuring Control Plane Latency in SDN-enabled Switches Keqiang He, Junaid Khalid, Aaron Gember-Jacobson, Sourav Das, Chaithan Prakash, Aditya Akella,
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
Vladimír Smotlacha CESNET Full Packet Monitoring Sensors: Hardware and Software Challenges.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Firewall Fingerprinting Amir R. Khakpour 1, Joshua W. Hulst 1, Zhihui Ge 2, Alex X. Liu 1, Dan Pei 2, Jia Wang 2 1 Michigan State University 2 AT&T Labs.
ICOM 6115: Computer Systems Performance Measurement and Evaluation August 11, 2006.
SECURITY POLICY ANALYZER FINAL MEETING Industrial Project (234313) Fall 2013 Supervisors: Yevgeny Fabrikant Students: Regev Brody, Yuval Adelstein COMPUTER.
StriD 2 FA: Scalable Regular Expression Matching for Deep Packet Inspection Author: Xiaofei Wang, Junchen Jiang, Yi Tang, Bin Liu, and Xiaojun Wang Publisher:
Implications of Power Control in Wireless Networks: A Quantitative Study Ioannis Broustis, Jakob Eriksson, Srikanth V. Krishnamurthy, Michalis Faloutsos.
Efficient Cache Structures of IP Routers to Provide Policy-Based Services Graduate School of Engineering Osaka City University
Xrootd Monitoring and Control Harsh Arora CERN. Setting Up Service  Monalisa Service  Monalisa Repository  Test Xrootd Server  ApMon Module.
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
Packet Classification Using Dynamically Generated Decision Trees
Access Link Capacity Monitoring with TFRC Probe Ling-Jyh Chen, Tony Sun, Dan Xu, M. Y. Sanadidi, Mario Gerla Computer Science Department, University of.
Spark on Entropy : A Reliable & Efficient Scheduler for Low-latency Parallel Jobs in Heterogeneous Cloud Huankai Chen PhD Student at University of Kent.
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
Ethernet Packet Filtering – Part 2 Øyvind Holmeide 10/28/2014 by.
SketchVisor: Robust Network Measurement for Software Packet Processing
Data Science Credibility: Evaluating What’s Been Learned
2018/4/23 Dynamic Load-balanced Path Optimization in SDN-based Data Center Networks Author: Yuan-Liang Lan , Kuochen Wang and Yi-Huai Hsu Presenter: Yi-Hsien.
Hydra: Leveraging Functional Slicing for Efficient Distributed SDN Controllers Yiyang Chang, Ashkan Rezaei, Balajee Vamanan, Jahangir Hasan, Sanjay Rao.
Fast Pattern-Based Throughput Prediction for TCP Bulk Transfers
Network Performance and Quality of Service
Empirically Characterizing the Buffer Behaviour of Real Devices
Rohit Kapoor, Ling-Jyh Chen, M. Y. Sanadidi, Mario Gerla
Mean Value Analysis of a Database Grid Application
A Framework for Automatic Resource and Accuracy Management in A Cloud Environment Smita Vijayakumar.
DDoS Attack Detection under SDN Context
Computer Science and Engineering, University of California, Riverside
Soft Error Detection for Iterative Applications Using Offline Training
POOJA Programmer, CSE Department
Pei Fan*, Ji Wang, Zibin Zheng, Michael R. Lyu
Title of Your Paper Names of Co-Authors
Performance Evaluation of Computer Networks
The War Between Mice & Elephants by, Matt Hartling & Sumit Kumbhar
The Vision of Self-Aware Performance Models
Performance Evaluation of Computer Networks
Chapter-5 Traffic Engineering.
Duo Liu, Bei Hua, Xianghui Hu, and Xinan Tang
Fast Network Congestion Detection And Avoidance Using P4
Lu Tang , Qun Huang, Patrick P. C. Lee
Modeling and Evaluating Variable Bit rate Video Steaming for ax
Approximate Mean Value Analysis of a Database Grid Application
Hazem Hamed, Adel El-Atawy, Ehab Al-Shaer
Presentation transcript:

Computer Science and Engineering, University of California, Riverside SyFi: A Systematic Approach for Estimating Stateful Firewall Performance Yordanos Beyene Michalis Faloutsos Harsha V. Madhyastha Computer Science and Engineering, University of California, Riverside

Which firewall will meet my throughput needs? Problem spec: Input: traffic workload Output: select the right firewall Solution requirements: systematic, accurate, cost effective Can't run each workload on each firewall Add picture: Network (cloud) –Firewall (box)- a questionmark on the box?

SyFi: Estimating firewall performance without tears Key novelty: - Identify what really affects firewall performance - Develop SyFi predictive model for any workload -- We only need to measure 4 parameters once! SyFi is highly accurate ~94% accuracy - Validated through experiments with real firewalls

Motivation: It is the wild west out there.... Performance is workload specific There is no systematic methodology Buyers fliers "lie" by presenting best case numbers Relative order of which is best firewall varies by workload!

Roadmap Part I: Measurement: what affects FWall performance Part II: The SyFi Predictive Model Validation of Model Previous work Conclusion

Part I: What really affects FWall performance? Experiments conducted on two commercial firewalls SonicWall E5500, and Fortinet Fortigate-ONE We used a third commercial firewall to validate model: HP TMSzl firewall Traffic generating tool: BreakingPoint Systems

#Concurrent Sessions: no effect The number of active sessions on firewalls has negligible impact on maximum packet rate of firewalls. Similar results observed with UDP packets

Packet Size: no effect Packet size does not affect maximum packet rate! THUS: thruput should be reported in packets/sec Similar results observed with UDP packets

The first packet takes longer: #sessions matters Packets that create sessions on Firewalls impose significantly higher cost that subsequent packets. Session rate: Sessions of 1 packet Packet rate: Session of 10K packets The overall idea for figure:

TCP is costlier than UDP TCP packets impose higher cost than UDP packets. Similar results are observed with UDP versus TCP session packets.

SyFi Measurement: ACL Size Access Control List (ACL) size no impact on data packets that belong to an existing sessions, but affects session rate significantly. Similar results are observed with the other firewall devices. This slide is not critical it can be shown just to show that we thought about this, but it can be skipped completely too…

SyFi Measurement: Key Findings Identified four types of packets that generate different load TCP SYN packets – trigger session on firewall TCP data packets UDP flow first packets - trigger session on firewall UDP flow subsequent packets Number of concurrent flows doesn’t matter Packet size has negligible impact on packet rate The size of ACL has significant impact on session rate

Part II: The SyFi Predictive Model Measure once, for each firewall, cost Ct: C1: TCP session start C2: TCP subsequent packet C3: UDP flow first packet C4: UDP flow subsequent packet Cost is expressed relatively to 100% utilization Transform traffic load to, percentage of packets Pt #sessions, and length for UDP and TCP Calculate expected thruput Note: model does not consider ACL effect

Step 1: How to measure packet cost in practice For a given firewall, do Maximum Packet Rate Procedure (MPRP) Each flow sends 10,000 packets per second Initialize: start with 1 flow Repeat: add 1 flow that sends 10,000 packets per second every 60 seconds Stop: when packets start to drop. MPRP is used to measure maximum packet rate for both TCP (MPR_TCP) and UDP(MPR_UDP) C2 = 1/(MPR_TCP) ; C4= 1/(MPR_UDP) The limitation of 10,000 packets /second/flow is test tool limitation

Step I: How to measure session setup cost For each firewall, do Maximum Session Rate Procedure (MSRP) Each flow has ``one” packet Every second start S new flows Initialize: start S=5k new flows every second Repeat: Increase S by 1K flows every 60 seconds Stop: when packets start to drop MSRP is used to measure maximum packet rate for both TCP (MSR_TCP) and UDP(MSR_UDP) C1 = 1/(MSR_TCP) ; C3= 1/(MSR_UDP) For both TCP and UDP sessions Tip: firewalls configured with low session time-out to avoid session table overflow. MSRP is used to measure maximum TCP and UDP session rate with flows that send packets that create new sessions on the firewall but don’t send subsequent data packets.

Step II: Transform expected workload to numbers Given that only the four packet types matter We only need to know Percentage of packets Pt are in each type!

Step III: The Predictive Part Given workload type: Pt : percentage of packet type t Measured (once per firewall): Ct : cost of packet type t Two Outcomes: For a given traffic intensity, N Predict total system utilization U where N is the total number of packets/sec) For a 100% system utilization, U = 100% Predict max N for a given workload N: total number of packet/sec Given average packet size , throughput can be computed in bytes per second( bps) Sidenote: CPU is the bottleneck: Cost reflects CPU utilization Ct Maximum N computed when CPU utilization is 100% i.e. c=1

Prediction test case Take home message: it is very simple! Sample workload: 20 % tcp flows, 80% udp flows tcp flow packet count = 10 ; tcp average packet size=512 bytes udp flow packet count = 100; udp average packet size=64 bytes; Firewall measured Cost: C1=1/10,000, c2=1/200,000, c3=1/30,000, c4=1/400,000 Calculate Pi: P1 = 0.2(1/10) , P2 = 0.2(9/10), P3 = 0.8(1/100), P4 = 0.8(99/100) Calculate maximum packets per second(pps) N= (0.2(1/10)*1/10,000 + 0.2(9/10)*1/200,000 + 0.8(1/100)*30,000 + 0.8(99/100)*1/400,000) Calculate Throughput in Bytes (bps) Throughput in bytes = o.2*N *512 bytes + 0.8*N*64 bytes

The model is >94% accurate Workload: TP1, TP2, TP3, TP4, details in the paper Compares measured with model results using the third firewall

Previous work Improving Firewall architecture Research so far has not focused on this problem, but focuses more on: Detecting Firewall Rules conflicts Al-Shaer, E., Hamed, H., Boutaba, R., Hasan, M.: Conflict classification and analysis of distributed firewall policies. In: IEEE JSAC (2005) Baboescu, F., Varghese, G.: Fast and scalable conflict detection for packet classifiers. In: IEEE ICNP (2002) Hari, A., Suri, S., Parulkar, G.: Detecting and resolving packet filter conflicts. In: IEEE INFOCOM (2000) Optimizing firewall rule sets Acharya, S., Wang, J., Ge, Z., Zane, T.F., Greenberg, A.: Traffic-aware firewall optimization strategies. In: ICC (2006) Cohen, E., Lund, C.: Packet classification in large ISPs: Design and evaluation of decision tree classifiers. In: ACM SIGMETRICS (2005) Hamed, H., Al-Shaer, E.: Dynamic rule-ordering optimization for high-speed firewall filtering. In: ASIACCS (2006) Improving Firewall architecture Gouda, M.G., Liu, A., Jafry, M.: Verification of distributed firewalls. In: IEEE GLOBECOM (2008) Gouda, M.G., Liu, A.X.: Structured firewall design. Computer Networks (2007) Liu, A.X.: Firewall policy verification and troubleshooting. In: ICC (2008)

Conclusion Currently assessing firewall performance is “chaotic” Leaves room for manipulation by vendors! Key contribution: - We identify what really affects firewall performance - Develop SyFi predictive model for any workload - We only need to measure 4 parameters once! SyFi is highly accurate ~94% accuracy - Validated through experiments with real firewalls

Future Work Our model was focused on stateful firewalls which inspect packet headers only. We are working on expanding our model to network security devices that inspect payload. We expect packet size to have a significant impact on performance when packet payload inspection is involved.

Thank you!