Virtual Switching Without a Hypervisor for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton)

Slides:



Advertisements
Similar presentations
Greening Backbone Networks Shutting Off Cables in Bundled Links Will Fisher, Martin Suchara, and Jennifer Rexford Princeton University.
Advertisements

Building Fast, Flexible Virtual Networks on Commodity Hardware Nick Feamster Georgia Tech Trellis: A Platform for Building Flexible, Fast Virtual Networks.
1 Building a Fast, Virtualized Data Plane with Programmable Hardware Bilal Anwer Nick Feamster.
Enabling Fast, Dynamic Network Processing with ClickOS
1 Copyright © 2005, Oracle. All rights reserved. Introducing the Java and Oracle Platforms.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Secure Virtual Machine Execution Under an Untrusted Management OS Chunxiao Li Anand Raghunathan Niraj K. Jha.
Real Time Versions of Linux Operating System Present by Tr n Duy Th nh Quách Phát Tài 1.
1 Peripheral Component Interconnect (PCI). 2 PCI based System.
Debugging operating systems with time-traveling virtual machines Sam King George Dunlap Peter Chen CoVirt Project, University of Michigan.
1 VIRTUAL MACHINES By: Sai Siddharth Kumar Dantu.
Diagnosing Performance Overheads in the Xen Virtual Machine Environment Aravind Menon Willy Zwaenepoel EPFL, Lausanne Jose Renato Santos Yoshio Turner.
© MIRANTIS 2012PAGE 1© MIRANTIS 2012 Does Hypervisor Matter in OpenStack Greg Elkinbard Senior Technical Director.
Content Overview Virtual Disk Port to Intel platform
Redesigning Xen Memory Sharing (Grant) Mechanism Kaushik Kumar Ram (Rice University) Jose Renato Santos (HP Labs) Yoshio Turner (HP Labs) Alan L. Cox (Rice.
The Platform as a Service Model for Networking Eric Keller, Jennifer Rexford Princeton University INM/WREN 2010.
Verifiable Network Function Outsourcing Seyed K. FayazbakhshMichael K. ReiterVyas Sekar 1.
Virtualization Technology
Virtual Machine Technology Dr. Gregor von Laszewski Dr. Lizhe Wang.
KAIST Computer Architecture Lab. The Effect of Multi-core on HPC Applications in Virtualized Systems Jaeung Han¹, Jeongseob Ahn¹, Changdae Kim¹, Youngjin.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
Addition 1’s to 20.
25 seconds left…...
Week 1.
Breaking Up is Hard to Do Security and Functionality in a Commodity Hypervisor 1 Patrick Colp†, Mihir Nanavati†, Jun Zhu‡ William Aiello†, George Coker*,
NetSlices: Scalable Multi-Core Packet Processing in User-Space Tudor Marian, Ki Suh Lee, Hakim Weatherspoon Cornell University Presented by Ki Suh Lee.
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Performance Evaluation of Open Virtual Routers M.Siraj Rathore
NoHype: Virtualized Cloud Infrastructure without the Virtualization Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby Lee ISCA 2010 Princeton University.
Keith Wiles DPACC vNF Overview and Proposed methods Keith Wiles – v0.5.
Network Implementation for Xen and KVM Class project for E : Network System Design and Implantation 12 Apr 2010 Kangkook Jee (kj2181)
Virtualization for Cloud Computing
Virtual Machine Security Summer 2013 Presented by: Rostislav Pogrebinsky.
Container-based OS Virtualization A Scalable, High-performance Alternative to Hypervisors Stephen Soltesz, Herbert Pötzl, Marc Fiuczynski, Andy Bavier.
5205 – IT Service Delivery and Support
Extreme Networks Confidential and Proprietary. © 2010 Extreme Networks Inc. All rights reserved.
Hosting Virtual Networks on Commodity Hardware VINI Summer Camp.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
Jakub Szefer, Eric Keller, Ruby B. Lee Jennifer Rexford Princeton University CCS October, 2011 報告人:張逸文.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2010 Seminar #1 VIRTUALIZATION EVERYWHERE.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2009 Seminar #1 VIRTUALIZATION EVERYWHERE.
NoHype: Virtualized Cloud Infrastructure without the Virtualization Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby Lee (ISCA follow up soon to.
Improving Network I/O Virtualization for Cloud Computing.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Penn State CSE “Optimizing Network Virtualization in Xen” Aravind Menon, Alan L. Cox, Willy Zwaenepoel Presented by : Arjun R. Nath.
Network Plus Virtualization Concepts. Virtualization Overview Virtualization is the emulation of a computer environment called a Virtual Machine. A Hypervisor.
Politecnico di Torino Dipartimento di Automatica ed Informatica TORSEC Group Performance of Xen’s Secured Virtual Networks Emanuele Cesena Paolo Carlo.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
Our work on virtualization Chen Haogang, Wang Xiaolin {hchen, Institute of Network and Information Systems School of Electrical Engineering.
High Performance Computing on Virtualized Environments Ganesh Thiagarajan Fall 2014 Instructor: Yuzhe(Richard) Tang Syracuse University.
Virtualization for the LHCb Online system CHEP Taipei Dedicato a Zio Renato Enrico Bonaccorsi, (CERN)
Bart Miller – October 22 nd,  TCB & Threat Model  Xen Platform  Xoar Architecture Overview  Xoar Components  Design Goals  Results  Security.
Improving Xen Security through Disaggregation Derek MurrayGrzegorz MilosSteven Hand.
SECURING SELF-VIRTUALIZING ETHERNET DEVICES IGOR SMOLYAR, MULI BEN-YEHUDA, AND DAN TSAFRIR PRESENTED BY LUREN WANG.
Introduction to virtualization
Security Vulnerabilities in A Virtual Environment
Full and Para Virtualization
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
Virtualization for Cloud Computing
Breaking Up is Hard to Do
Presented by Yoon-Soo Lee
Current Generation Hypervisor Type 1 Type 2.
Performance Comparison of Virtual Machines and Containers with Unikernels Nagashree N Suprabha S Rajat Bansal.
Group 8 Virtualization of the Cloud
Cloud computing mechanisms
Presentation transcript:

Virtual Switching Without a Hypervisor for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton) 1

Public Cloud Infrastructure Cloud providers offer computing resources on demand to multiple “tenants” Benefits: – Public (any one can use) – Economies of scale (lower cost) – Flexibility (pay-as-you-go) 2

Hardware Server Virtualization Multiple VMs run on the same server Benefits – Efficient use of server resources – Backward compatibility Examples – Xen – KVM – VMware VM Hypervisor 3

Network Virtualization Software switches – Run in the hypervisor or the control VM (Dom0) Benefits: Flexible control at the “edge” – Access control – Resource and name space isolation – Efficient communication between co-located VMs Examples – Open vSwitch – VMware’s vSwitch – Cisco’s Nexus 1000v Switch Hardware VM Software Switch Hypervisor 4

Security: a major impediment for moving to the cloud! Let’s take a look at where the vulnerabilities are… 5

Guest VM 2Guest VM 3 Hardware Hypervisor Guest VM 1 Vulnerabilities in Server Virtualization The hypervisor is quite complex Large amount of code ―> Bugs (NIST’s National Vulnerability Database) 6

Guest VM 2Guest VM 3 Hardware Hypervisor Guest VM 1 Vulnerabilities in Server Virtualization The hypervisor is an attack surface (bugs, vulnerable) ―> Malicious customers attack the hypervisor 7

Vulnerabilities in Network Virtualization Software switch in control VM (Dom0) Hypervisor is involved in communication Hardware Hypervisor Dom0 Software Switch Physical NIC Guest VM 2Guest VM 1 Virtual Interface Virtual Interface 8

Hardware Hypervisor Dom0 Software Switch Physical NIC Guest VM 2Guest VM 1 Virtual Interface Virtual Interface Software switch is coupled with the control VM ―> e.g., software switch crash can lead to a complete system crash Vulnerabilities in Network Virtualization 9

Dom0 Disaggregation [e.g., SOSP’11] Disaggregate control VM (Dom0) into smaller, single-purpose and independent components Malicious customer can still attack hypervisor! Hardware Hypervisor Guest VM 1 Dom0Guest VM 2 Service VM Service VM Service VM Service VM 10

NoHype [ISCA’10, CCS’11] Eliminate the hypervisor attack surface What if I want to use a software switch? Hypervisor Dom0 Emulate, Manage Hardware Virtualized Physical NIC Physical Device Driver Pre-allocating memory and cores Using hardware virtualized I/O devices Hypervisor is only used to boot up and shut down guest VMs. Guest VM 1Guest VM 2 11

Software Switching in NoHype Bouncing packets through the physical NIC Consumes excessive bandwidth on PCI bus and the physical NIC! Guest VM 1Guest VM 3 Hypervisor Hardware Virtualized Physical NIC Physical Device Driver Guest VM 2 Software Switch Dom0 Emulate, Manage 12

Our Solution Overview Eliminate the hypervisor attack surface Enable software switching in an efficient way Hardware Guest VM 1 DomS Guest VM 2 Virtual Interface Software Switch Physical NIC Virtual Interface Hypervisor Dom0 Emulate, Manage 13

Hypervisor Eliminate the Hypervisor-Guest Interaction Shared memory – Two FIFO buffers for communication Polling only – Do not use event channel; no hypervisor involvement FIFO Polling Guest VM 1 Virtual Interface Dom0 Software Switch 14

Limit Damage From a Compromised Switch Decouple software switch from Dom0 – Introduce a Switch Domain (DomS) Decouple software switch from the hypervisor – Eliminate the hypervisor attack surface Hypervisor FIFO Polling Guest VM 1 Virtual Interface DomS Software Switch Dom0 FIFO Polling Guest VM 1 Virtual Interface DomS Software Switch Dom0 Hypervisor FIFO Polling Guest VM 1 Virtual Interface Dom0 Software Switch 15

Preliminary Prototype Prototype based on – Xen 4.1: used to boot up/shut down VMs – Linux 3.1: kernel module to implement polling/FIFO – Open vSwitch Hypervisor Dom0 Software Switch Guest VM 1 Virtual Interface Native Xen Hardware FIFO Polling Guest VM 1 Virtual Interface DomS Software Switch Our Solution Hardware Hypervisor Dom0

Preliminary Evaluation Evaluate the throughput between DomS and a guest VM, compared with native Xen Traffic measurement: Netperf Configuration: each VM has 1 core and 1GB of RAM 17 Hypervisor Dom0 Software Switch Guest VM 1 Virtual Interface Native Xen Hardware FIFO Polling Guest VM 1 Virtual Interface DomS Software Switch Our Solution Hardware Hypervisor Dom0

Evaluation on Throughput FIFO Size – Polling period is fixed to 1ms – Reach high throughput with just 256 FIFO pages (Only 1MB) Polling Period – Shorter polling period, higher throughput – CPU resource consumption? ―> Future work 18

Comparison with Native Xen Outperforms native Xen when message size is smaller than 8 KB. Future work: incorporate more optimization 19

Conclusion and Future Work Trend towards software switching in the cloud Security in hypervisor and Dom0 is a big concern Improve security by enabling software switching without hypervisor involvement Future work – Detection and remediation of DomS compromise 20

Thanks! Q&A 21